US20230019089A1 - Communication system, method, and apparatus - Google Patents
Communication system, method, and apparatus Download PDFInfo
- Publication number
- US20230019089A1 US20230019089A1 US17/954,167 US202217954167A US2023019089A1 US 20230019089 A1 US20230019089 A1 US 20230019089A1 US 202217954167 A US202217954167 A US 202217954167A US 2023019089 A1 US2023019089 A1 US 2023019089A1
- Authority
- US
- United States
- Prior art keywords
- network element
- function network
- identification information
- terminal device
- akma
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 160
- 238000004891 communication Methods 0.000 title claims abstract description 91
- 238000013523 data management Methods 0.000 claims abstract description 90
- 230000005540 biological transmission Effects 0.000 claims abstract description 28
- 230000004044 response Effects 0.000 claims description 99
- 230000008569 process Effects 0.000 claims description 53
- 238000013475 authorization Methods 0.000 claims description 34
- 238000001514 detection method Methods 0.000 claims description 33
- 238000007726 management method Methods 0.000 claims description 19
- 230000006870 function Effects 0.000 description 362
- 230000000875 corresponding effect Effects 0.000 description 218
- 230000015654 memory Effects 0.000 description 43
- 238000012545 processing Methods 0.000 description 19
- 238000012790 confirmation Methods 0.000 description 14
- 238000013461 design Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 8
- 230000003993 interaction Effects 0.000 description 7
- 238000004590 computer program Methods 0.000 description 6
- CNQCVBJFEGMYDW-UHFFFAOYSA-N lawrencium atom Chemical compound [Lr] CNQCVBJFEGMYDW-UHFFFAOYSA-N 0.000 description 4
- ORQBXQOJMQIAOY-UHFFFAOYSA-N nobelium Chemical compound [No] ORQBXQOJMQIAOY-UHFFFAOYSA-N 0.000 description 4
- 230000001360 synchronised effect Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000003190 augmentative effect Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
- H04W60/04—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration using triggered events
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/06—Registration at serving network Location Register, VLR or user mobility server
- H04W8/065—Registration at serving network Location Register, VLR or user mobility server involving selection of the user mobility server
Definitions
- This application relates to the field of communication technologies, and in particular, to a communication system, method and apparatus.
- an access network device when receiving a registration request from the terminal device, selects a mobility management network element, and forwards the registration request to the mobility management network element, where the registration request may carry identity information of the terminal device.
- the mobility management network element may select an authentication server function network element based on the identity information of the terminal device that is carried in the registration request.
- the authentication server function network element may determine, based on the identity information of the terminal device, a unified data management network element serving the terminal device.
- the terminal device may support an authentication and key management for applications (authentication and key management for applications, AKMA) service.
- AKMA authentication and key management for applications
- the terminal device may perform data transmission with an application function network element not through the mobility management network element.
- the application function network element needs to learn of a communication key between the application function network element and the terminal device.
- the application function network element obtains the communication key between the application function network element and the terminal device from an AKMA anchor function network element, and the AKMA anchor function network element generates the communication key between the application function network element and the terminal device based on a key of the AKMA service of the terminal device and an identifier of the application function network element.
- the AKMA anchor function network element obtains the key of the AKMA service of the terminal device from the authentication server function network element corresponding to the terminal device, and the authentication server function network element corresponding to the terminal device stores an intermediate key generated in a primary authentication process.
- the authentication server function network element corresponding to the terminal device generates the key of the AKMA service of the terminal device based on the intermediate key.
- AKMA anchor function network element determines the authentication server function network element corresponding to the terminal device is an urgent technical problem to be resolved.
- This application provides a communication system, method and apparatus, so that an AKMA anchor function network element can quickly and accurately determine an authentication server function network element corresponding to a terminal device.
- a first aspect of this application provides a communication system, where the system is configured to implement AKMA service-based data transmission between a terminal device and an application function network element, and the system includes an AKMA anchor function network element and a network exposure function network element, where the network exposure function network element is configured to: obtain first identification information from a unified data management network element, where the first identification information is used to determine an authentication server function network element corresponding to the terminal device, and send the first identification information to the AKMA anchor function network element; and the AKMA anchor function network element is configured to obtain, from the unified data management network element based on the first identification information, identification information of the authentication server function network element corresponding to the terminal device.
- the authentication server function network element corresponding to the terminal device is an authentication server function network element corresponding to an intermediate key of the terminal device, and stores the intermediate key generated by the authentication server function network element in a primary authentication process.
- the intermediate key is, for example, Kausf.
- the network exposure function network element obtains the first identification information from the unified data management network element, and sends the first identification information to the AKMA anchor function network element; and the AKMA anchor function network element obtains, from the unified data management network element based on the first identification information, the identification information of the authentication server function network element corresponding to the terminal device, so that the AKMA anchor function network element can quickly and accurately determine the authentication server function network element corresponding to the terminal device.
- that the first identification information is used to determine the authentication server function network element corresponding to the terminal device may be that the network exposure function network element determines the authentication server function network element corresponding to the terminal device in a direct determining manner or in an auxiliary determining manner, or may be that the AKMA anchor function network element determines the authentication server function network element corresponding to the terminal device in a direct determining manner or in an auxiliary determining manner.
- the direct determining manner means that additional information does not need to be obtained, and the determining is enabled directly based on the first identification information. This manner is easy to implement.
- the auxiliary determining manner means that additional information needs to be obtained, and the determining is performed with reference to the first identification information.
- the network exposure function network element is specifically configured to: receive second identification information from the application function network element; send a first request message to the unified data management network element when determining that the application function network element authorizes the network exposure function network element to request a key, where the first request message includes the second identification information, and requests the unified data management network element to determine the first identification information based on the second identification information; and receive a first response message from the unified data management network element, where the first response message includes the first identification information. Therefore, the network exposure function network element obtains the first identification information from the unified data management network element, so that a core network element obtains, from the unified data management network element based on the first identification information, the identification information of the authentication server function network element corresponding to the terminal device.
- the second identification information includes identification information of a key of the AKMA service
- the identification information of the key of the AKMA service is unique
- the first identification information includes a subscriber permanent identifier SUPI of the terminal device.
- the second identification information includes identification information of a key of the AKMA service and temporary identity information of the terminal device, the identification information of the key of the AKMA service is not unique, and the first identification information includes an SUPI of the terminal device.
- the unified data management network element may determine intermediate information based on the identification information of the key of the AKMA service.
- the intermediate information may be, for example, the SUPI of the terminal device.
- the unified data management network element determines the first identification information based on the second identification information, and sends the SUPI of the terminal device to the network exposure function network element, and the network exposure function network element may send the SUPI of the terminal device to the AKMA anchor function network element.
- the AKMA anchor function network element may obtain, from the unified data management network element by using the SUPI of the terminal device, the identification information of the authentication server function network element corresponding to the terminal device. This manner may be understood as the auxiliary determining manner.
- the unified data management network element may directly determine, based on the identification information of the key of the AKMA service, subscription data of the AKMA service and/or the identification information of the authentication server function network element corresponding to the terminal device. Further, the AKMA anchor function network element may obtain, from the unified data management network element, the identification information of the authentication server function network element corresponding to the terminal device. If only the subscription data of the AKMA service is determined, the subscription data of the AKMA service may include the identification information of the authentication server function network element corresponding to the terminal device. This manner may be understood as the direct determining manner.
- the key of the AKMA service may be Kakma, and the temporary identity information of the terminal device may be a subscription concealed identifier (subscriber concealed identifier, SUCI), a generic public subscription identifier (generic public subscription identifier, GPSI), or the like.
- subscription concealed identifier subscriber concealed identifier, SUCI
- generic public subscription identifier generator public subscription identifier, GPSI
- the AKMA anchor function network element is specifically configured to: send a second request message to the unified data management network element, where the second request message includes the SUPI of the terminal device, and the second request requests the unified data management network element to determine, based on the SUPI of the terminal device, the identification information of the authentication server function network element corresponding to the terminal device; and receive a second response message from the unified data management network element, where the second response message includes the identification information of the authentication server function network element corresponding to the terminal device. Therefore, the AKMA anchor function network element obtains, from the unified data management network element, the identification information of the authentication server function network element corresponding to the terminal device, and then can quickly and accurately determine the authentication server function network element corresponding to the terminal device.
- the network exposure function network element is further configured to: receive an identifier of the application function network element; and send the identifier of the application function network element to the AKMA anchor function network element.
- the AKMA anchor function network element is further configured to: obtain, from the authentication server function network element corresponding to the terminal device, the key that is of the AKMA service and that is identified by identification information of the key of the AKMA service; generate a communication key between the application function network element and the terminal device based on the identifier of the application function network element and the key of the AKMA service; and send the communication key to the application function network element by using the network exposure function network element. Therefore, the application function network element may encrypt, by using the communication key, data to be sent to the terminal device, and this helps improve data transmission security.
- the AKMA anchor function network element is further configured to: perform authorization detection on the terminal device or the application function network element, and when completing the authorization detection, determine the authentication server function network element corresponding to the terminal device.
- the AKMA anchor function network element is further configured to: perform authorization detection on the terminal device or the application function network element, and when completing the authorization detection, generate the communication key between the application function network element and the terminal device. The authorization detection can improve network security.
- a second aspect of this application provides a communication method, where the method is used to implement AKMA service-based data transmission between a terminal device and an application function network element, the method may be performed by an AKMA anchor function network element, or may be performed by a component (for example, a processor, a chip, or a chip system) of the AKMA anchor function network element, and the method may include:
- the AKMA anchor function network element receives first identification information from a network exposure function network element, where the first identification information is used to determine an authentication server function network element corresponding to the terminal device; and obtains, from a unified data management network element based on the first identification information, identification information of the authentication server function network element corresponding to the terminal device.
- the authentication server function network element corresponding to the terminal device is an authentication server function network element corresponding to an intermediate key of the terminal device, and stores the intermediate key generated by the authentication server function network element in a primary authentication process.
- the intermediate key is, for example, Kausf.
- the AKMA anchor function network element obtains, from the unified data management network element based on the first identification information, the identification information of the authentication server function network element corresponding to the terminal device, so that the AKMA anchor function network element can quickly and accurately determine the authentication server function network element corresponding to the terminal device.
- the first identification information includes an SUPI of the terminal device.
- the AKMA anchor function network element sends a second request message to the unified data management network element, where the second request message includes the SUPI of the terminal device, and the second request requests the unified data management network element to determine, based on the SUPI of the terminal device, the identification information of the authentication server function network element corresponding to the terminal device; and receives a second response message from the unified data management network element, where the second response message includes the identification information of the authentication server function network element corresponding to the terminal device. Therefore, the AKMA anchor function network element obtains, from the unified data management network element, the identification information of the authentication server function network element corresponding to the terminal device, and then can quickly and accurately determine the authentication server function network element corresponding to the terminal device.
- the second response message further includes subscription data of the AKMA service of the terminal device.
- the AKMA anchor function network element may perform authorization detection on the terminal device or the application function network element based on the subscription data of the AKMA service of the terminal device, so that network security can be improved.
- the AKMA anchor function network element receives an identifier of the application function network element from the network exposure function network element; obtains, from the authentication server function network element corresponding to the terminal device, the key that is of the AKMA service and that is identified by identification information of the key of the AKMA service; generates a communication key between the application function network element and the terminal device based on the identifier of the application function network element and the key of the AKMA service; and sends the communication key to the application function network element by using the network exposure function network element. Therefore, the application function network element may encrypt, by using the communication key, data to be sent to the terminal device, and this helps improve data transmission security.
- the AKMA anchor function network element performs authorization detection on the terminal device or the application function network element, and when completing the authorization detection, determines the authentication server function network element corresponding to the terminal device.
- the AKMA anchor function network element is further configured to: perform authorization detection on the terminal device or the application function network element, and when completing the authorization detection, generate the communication key between the application function network element and the terminal device. The authorization detection can improve network security.
- a third aspect of this application provides a communication method, where the method is used to implement AKMA service-based data transmission between a terminal device and an application function network element, the method may be performed by a network exposure function network element, or may be performed by a component (for example, a processor, a chip, or a chip system) of the network exposure function network element, and the method may include:
- the network exposure function network element obtains first identification information from a unified data management network element, where the first identification information is used to determine an authentication server function network element corresponding to the terminal device, and sends the first identification information to an AKMA anchor function network element.
- the authentication server function network element corresponding to the terminal device is an authentication server function network element corresponding to an intermediate key of the terminal device, and stores the intermediate key generated by the authentication server function network element in a primary authentication process.
- the intermediate key is, for example, Kausf.
- the network exposure function network element obtains the first identification information, and sends the first identification information to the AKMA anchor function network element; so that the AKMA anchor function network element obtains, from the unified data management network element based on the first identification information, the identification information of the authentication server function network element corresponding to the terminal device, so that the AKMA anchor function network element can quickly and accurately determine the authentication server function network element corresponding to the terminal device.
- the network exposure function network element receives second identification information from the application function network element; sends a first request message to the unified data management network element when determining that the application function network element authorizes the network exposure function network element to request a key, where the first request message includes the second identification information, and requests the unified data management network element to determine the first identification information based on the second identification information; and receives a first response message from the unified data management network element, where the first response message includes the first identification information. Therefore, the network exposure function network element obtains the first identification information from the unified data management network element, so that a core network element obtains, from the unified data management network element based on the first identification information, the authentication server function network element corresponding to the terminal device.
- the second identification information includes identification information of a key of the AKMA service
- the identification information of the key of the AKMA service is unique
- the first identification information includes an SUPI of the terminal device.
- the second identification information includes identification information of a key of the AKMA service and temporary identity information of the terminal device, the identification information of the key of the AKMA service is not unique, and the first identification information includes an SUPI of the terminal device.
- the network exposure function network element receives the identifier of the application function network element, and sends the identifier of the application function network element to the AKMA anchor function network element, so that when the AKMA anchor function network element obtains the key of the AKMA service from the authentication server function network element corresponding to the terminal device, generates a communication key between the application function network element and the terminal device.
- a fourth aspect of this application provides a communication system, where the system is configured to implement AKMA service-based data transmission between a terminal device and an application function network element, and the system includes an AKMA anchor function network element and a network exposure function network element.
- the network exposure function network element is configured to: obtain first identification information from a unified data management network element, where the first identification information is used to determine an authentication server function network element corresponding to the terminal device; obtain, from the unified data management network element based on the first identification information, identification information of the authentication server function network element corresponding to the terminal device; and send the first identification information of the authentication server function network element corresponding to the terminal device to the AKMA anchor function network element.
- the AKMA anchor function network element is configured to receive the identification information of the authentication server function network element corresponding to the terminal device from the network exposure function network element.
- the authentication server function network element corresponding to the terminal device is an authentication server function network element corresponding to an intermediate key of the terminal device, and stores the intermediate key generated by the authentication server function network element in a primary authentication process.
- the intermediate key is, for example, Kausf.
- the network exposure function network element obtains the identification information of the authentication server function network element corresponding to the terminal device from the unified data management network element and sends the identification information of the authentication server function network element corresponding to the terminal device to the AKMA anchor function network element, so that the AKMA anchor function network element can quickly and accurately determine the authentication server function network element corresponding to the terminal device.
- the network exposure function network element is configured to: receive second identification information from the application function network element; send a first request message to the unified data management network element when determining that the application function network element authorizes the network exposure function network element to request a key, where the first request message includes the second identification information, and requests the unified data management network element to determine the first identification information based on the second identification information; and receive a first response message from the unified data management network element, where the first response message includes the first identification information. Therefore, the network exposure function network element obtains the first identification information from the unified data management network element, to obtain, from the unified data management network element based on the first identification information, the identification information of the authentication server function network element corresponding to the terminal device.
- the network exposure function network element is configured to: send a first request message to the unified data management network element, where the first request message includes the second identification information, and requests the unified data management network element to determine, based on the second identification information, the identification information of the authentication server function network element corresponding to the terminal device; and receive a first response message from the unified data management network element, where the first response message includes the identification information of the authentication server function network element corresponding to the terminal device. Therefore, the network exposure function network element directly obtains, from the unified data management network element, the identification information of the authentication server function network element corresponding to the terminal device.
- the second identification information includes identification information of a key of the AKMA service
- the identification information of the key of the AKMA service is unique
- the first identification information includes an SUPI of the terminal device.
- the second identification information includes identification information of a key of the AKMA service and temporary identity information of the terminal device, the identification information of the key of the AKMA service is not unique, and the first identification information includes an SUPI of the terminal device.
- a fifth aspect of this application provides a communication method, where the method is used to implement AKMA service-based data transmission between a terminal device and an application function network element, the method may be performed by an AKMA anchor function network element, or may be performed by a component (for example, a processor, a chip, or a chip system) of the AKMA anchor function network element, and the method may include:
- the AKMA anchor function network element is configured to receive identification information of an authentication server function network element corresponding to the terminal device from a network exposure function network element; and determine, based on the identification information of the authentication server function network element corresponding to the terminal device, the authentication server function network element corresponding to the terminal device.
- the AKMA anchor function network element directly obtains, from the network exposure function network element, the identification information of the authentication server function network element corresponding to the terminal device, so that the AKMA anchor function network element can quickly and accurately determine the authentication server function network element corresponding to the terminal device.
- a sixth aspect of this application provides a communication method, where the method is used to implement AKMA service-based data transmission between a terminal device and an application function network element, the method may be performed by a network exposure function network element, or may be performed by a component (for example, a processor, a chip, or a chip system) of the network exposure function network element, and the method may include:
- the network exposure function network element is configured to obtain, from the unified data management network element, identification information of an authentication server function network element corresponding to the terminal device; and send the identification information of the authentication server function network element corresponding to the terminal device to an AKMA anchor function network element.
- the network exposure function network element obtains, from the unified data management network element, the identification information of the authentication server function network element corresponding to the terminal device, and notifies the AKMA anchor function network element, so that the AKMA anchor function network element can quickly and accurately determine the authentication server function network element corresponding to the terminal device.
- the network exposure function network element obtains first identification information from a unified data management network element, where the first identification information is used to determine an authentication server function network element corresponding to the terminal device; obtains, from the unified data management network element based on the first identification information, identification information of the authentication server function network element corresponding to the terminal device; and sends the identification information of the authentication server function network element corresponding to the terminal device to the AKMA anchor function network element.
- the network exposure function network element is configured to: send a first request message to the unified data management network element, where the first request message includes second identification information, and requests the unified data management network element to determine, based on the second identification information, the identification information of the authentication server function network element corresponding to the terminal device; and receive a first response message from the unified data management network element, where the first response message includes the identification information of the authentication server function network element corresponding to the terminal device.
- a seventh aspect of this application provides a communication system, where the system is configured to implement AKMA service-based data transmission between a terminal device and an application function network element, and the system includes an AKMA anchor function network element and a network exposure function network element.
- the network exposure function network element is configured to receive a key request message from the application function network element, and send the key request message to the AKMA anchor function network element, where the key request message includes second identification information.
- the AKMA anchor function network element is configured to obtain, from a unified data management network element based on the second identification information, identification information of an authentication server function network element corresponding to the terminal device.
- the authentication server function network element corresponding to the terminal device is an authentication server function network element corresponding to an intermediate key of the terminal device, and stores the intermediate key generated by the authentication server function network element in a primary authentication process.
- the intermediate key is, for example, Kausf.
- the network exposure function network element directly forwards, to the AKMA anchor function network element, the key request message sent by the application function network element; and the AKMA anchor function network element autonomously obtains, from the unified data management network element based on the second identification information, the identification information of the authentication server function network element corresponding to the terminal device, so that the AKMA anchor function network element can quickly and accurately determine the authentication server function network element corresponding to the terminal device.
- the second identification information includes identification information of a key of the AKMA service, and the identification information of the key of the AKMA service is unique.
- the second identification information includes identification information of a key of the AKMA service and temporary identity information of the terminal device, and the identification information of the key of the AKMA service is not unique.
- the communication apparatus may be an AKMA anchor function network element, or may be a component of the AKMA anchor function network element, or an apparatus that can match and be used with the AKMA anchor function network element.
- the apparatus may include modules that are in correspondence with the methods/operations/steps/actions described in the second aspect or the fifth aspect. The modules may be implemented by using a hardware circuit, software, or a combination of the hardware circuit and the software.
- the apparatus may include a processing module and a transceiver module.
- the processing module is configured to: receive, by using the transceiver module, first identification information from a network exposure function network element, where the first identification information is used to determine an authentication server function network element corresponding to a terminal device; and obtain, from a unified data management network element based on the first identification information, identification information of the authentication server function network element corresponding to the terminal device.
- a ninth aspect of an embodiment of this application provides a communication apparatus.
- the apparatus includes a processor, configured to implement the method described in the second aspect.
- the apparatus may further include a memory, configured to store instructions and data.
- the memory is coupled to the processor.
- the apparatus may be enabled to implement the method described in the second aspect or the method described in the fifth aspect.
- the apparatus may further include a communication interface.
- the communication interface is used by the apparatus to communicate with another device.
- the communication interface may be a transceiver, a circuit, a bus, a module, or another type of communication interface.
- the another device may be a unified data management network element, a network exposure function network element or the like.
- the apparatus includes:
- the memory configured to store program instructions
- the processor is configured to control the communication interface to: receive first identification information from the network exposure function network element, where the first identification information is used to determine an authentication server function network element corresponding to a terminal device; and obtain, from the unified data management network element based on the first identification information, identification information of the authentication server function network element corresponding to the terminal device.
- a tenth aspect of an embodiment of this application provides a computer-readable storage medium, including instructions.
- the instructions When the instructions are run on a computer, the computer is enabled to perform the method provided in the second aspect or the method in the fifth aspect.
- the chip system includes a processor, and may further include a memory, configured to implement the method provided in the second aspect or the method in the fifth aspect.
- the chip system may include a chip, or may include a chip and another discrete component.
- a twelfth aspect of an embodiment of this application provides a communication apparatus.
- the communication apparatus may be a network exposure function network element, or may be a component of the network exposure function network element, or an apparatus that can match and be used with the network exposure function network element.
- the apparatus may include modules that are in correspondence with the methods/operations/steps/actions described in the third aspect or the sixth aspect. The modules may be implemented by using a hardware circuit, software, or a combination of the hardware circuit and the software.
- the apparatus may include a processing module and a transceiver module.
- the processing module is configured to: obtain, by using the transceiver module, first identification information from a unified data management network element, where the first identification information is used to determine an authentication server function network element corresponding to a terminal device, and send the first identification information to an AKMA anchor function network element.
- a thirteenth aspect of an embodiment of this application provides a communication apparatus.
- the apparatus includes a processor, configured to implement the method described in the third aspect.
- the apparatus may further include a memory, configured to store instructions and data.
- the memory is coupled to the processor.
- the apparatus may be enabled to implement the method described in the third aspect or the method described in the sixth aspect.
- the apparatus may further include a communication interface.
- the communication interface is used by the apparatus to communicate with another device.
- the communication interface may be a transceiver, a circuit, a bus, a module, or another type of communication interface.
- the another device may be a unified data management network element, a network exposure function network element or the like.
- the apparatus includes:
- the memory configured to store program instructions
- the processor is configured to control the communication interface to: obtain first identification information from the unified data management network element, where the first identification information is used to determine an authentication server function network element corresponding to a terminal device, and send the first identification information to an AKMA anchor function network element.
- a fourteenth aspect of an embodiment of this application provides a computer-readable storage medium, including instructions.
- the instructions When the instructions are run on a computer, the computer is enabled to perform the method provided in the third aspect or in the sixth aspect.
- a fifteenth aspect of an embodiment of this application provides a chip system.
- the chip system includes a processor, and may further include a memory, configured to implement the method provided in the third aspect or in the sixth aspect.
- the chip system may include a chip, or may include a chip and another discrete component.
- FIG. 1 is a schematic diagram of a network architecture of a 5G communication system
- FIG. 2 is a schematic diagram of a network architecture of an AKMA service
- FIG. 3 is a schematic flowchart of generating a key of an AKMA service
- FIG. 4 is a schematic flowchart of generating a communication key between an AF and UE
- FIG. 5 is a schematic diagram of a network architecture according to this application.
- FIG. 6 A and FIG. 6 B are a schematic flowchart of a communication method according to this application.
- FIG. 7 is a schematic flowchart before step 601 in FIG. 6 A and FIG. 6 B ;
- FIG. 8 A and FIG. 8 B are a schematic flowchart of another communication method according to this application.
- FIG. 9 is a schematic flowchart of still another communication method according to this application.
- FIG. 10 is a schematic diagram of a structure of a communication apparatus according to this application.
- FIG. 11 is a schematic diagram of a structure of another communication apparatus according to this application.
- the 5G system may include a terminal device, an access network, and a core network.
- a terminal device For example, refer to a schematic diagram of a network architecture of a 5G system shown in FIG. 1 .
- the terminal device is a device that has a wireless transceiver function, and may be deployed on the land, including an indoor or outdoor device, a hand-held device, a wearable device, or a vehicle-mounted device, or may be deployed on the water (for example, on a ship), or may be deployed in the air (for example, on a plane, a balloon, or a satellite).
- the terminal device may be a mobile phone (mobile phone), a tablet computer (pad), a computer having a wireless transceiver function, a virtual reality (virtual reality, VR) terminal device, an augmented reality (augmented reality, AR) terminal device, a wireless terminal in industrial control (industrial control), a vehicle-mounted terminal device, a wireless terminal in self-driving (self-driving), a wireless terminal in telemedicine (remote medical), a wireless terminal in a smart grid (smart grid), a wireless terminal in transportation safety (transportation safety), a wireless terminal in a smart city (smart city), a wireless terminal in a smart home (smart home), a wearable terminal device, or the like.
- the terminal device sometimes may also be referred to as a terminal, user equipment (user equipment, UE), an access terminal device, a vehicle-mounted terminal, an industrial control terminal, a UE unit, a UE station, a mobile station, a mobile console, a remote station, a remote terminal device, a mobile device, a UE agent, a UE apparatus, or the like.
- the terminal device may alternatively be fixed or mobile.
- FIG. 1 and this application an example in which the terminal device is UE is used for description.
- An access network is configured to implement an access-related function, and may provide a network access function for an authorized user in a specific area.
- the access network forwards a control signal and user data between the terminal device and a core network.
- the access network may include an access network device.
- the access network device may be a device that provides access for the terminal device, and may include a radio access network (radio access network, RAN) device and an device.
- the RAN device is mainly a wireless network device in a 3GPP network
- the AN device may be an access network device defined in non-3GPP.
- a device having a base station function may have different names.
- the device in a 5G system, the device is referred to as a RAN or a next generation base station (next-generation Node basestation, gNB).
- a next generation base station next generation Node basestation, gNB
- the device in a long term evolution (long term evolution, LTE) system, the device is referred to as an evolved NodeB (evolved NodeB, eNB or eNodeB).
- LTE long term evolution
- the core network is responsible for maintaining subscription data of a mobile network, and providing functions such as session management, mobility management, policy management, and security authentication for the UE.
- the core network may include the following network elements: a user plane function (user plane function, UPF) network element, an authentication service function (authentication server function, AUSF) network element, an access and mobility management function (access and mobility management function, AMF) network element, a session management function (session management function, SMF) network element, a network exposure function (network exposure function, NEF) network element, a network repository function (network function repository function, NRF) network element, a policy control function (policy control function, PCF) network element, a unified data management (unified data management, UDM) network element, and an application function (application function, AF) network element.
- a user plane function user plane function
- UPF authentication service function
- AMF access and mobility management function
- AMF access and mobility management function
- SMF session management function
- NEF network exposure function
- NRF network
- the AMF is mainly responsible for mobility management in the mobile network, such as user location update, registration of a user with a network, and user switching.
- the SMF is mainly responsible for session management in the mobile network, such as session establishment, modification, and release.
- the UPF is responsible for forwarding and receiving user data in the terminal device, may receive the user data from a data network, and transmit the user data to the terminal device by using the access network device; or may receive the user data from the terminal device by using the access network device, and forward the user data to the data network.
- the PCF mainly supports providing a unified policy framework to control network behavior, and providing a policy rule for a control layer network function, and is responsible for obtaining policy-decision-related subscription information of a user.
- the AUSF is configured to perform UE security authentication.
- the NEF is mainly configured to support capability and event exposure.
- the NRF is configured for storing and selecting network function entity information for another network element.
- the UDM is configured to store user data, for example, subscription data and authentication/authorization data.
- the AF interacts with a 3GPP core network to provide an application layer service, for example, provide application layer data routing, provide an access network capability exposure function, interact with a policy framework to provide policy control, and interact with an IP multimedia subsystem (IP multimedia subsystem, IMS) in a 5G network.
- IP multimedia subsystem IP multimedia subsystem
- the data network (data network, DN) is configured to provide services for users.
- the data network may be a private network, for example, a local area network.
- the data network may alternatively be an external network that is not controlled by operators, for example, the Internet (Internet).
- the data network may alternatively be a dedicated network jointly deployed by operators, for example, a network in the IMS.
- the terminal device may access the DN by using an established protocol data unit (protocol data unit, PDU) session.
- PDU protocol data unit
- UE that supports the AKMA service When UE that supports the AKMA service performs data transmission with an AF that supports the AKMA service, security protection based on an AKMA procedure can be performed to improve data transmission security.
- the AF corresponds to a video application program.
- using the AKMA service can improve data transmission security.
- FIG. 2 refers to a schematic diagram of a network architecture of an AKMA service shown in FIG. 2 .
- the network architecture shown in FIG. 2 includes UE, a (R)AN, an AUSF, an AMF, an AF, an NEF, an AKMA anchor function network element (AKMA anchor function, AAnF), and a UDM.
- FIG. 2 there are three manners in which the UE communicates with the AF.
- One manner is that the UE communicates with the AF by using the (R)AN and the AMF, one manner is that the UE communicates with the AF by using the AMF, and one manner is that the UE directly communicates with the AF through a Ua* interface.
- the Ua* interface is a communication interface between the UE and the AF.
- the AUSF may generate a key of the AKMA service, and provide the key of the AKMA service of the UE to the AAnF.
- the key of the AKMA service may be Kakma, or may be referred to as a root key of the AKMA service.
- a UE side also generates a same key of the AKMA service, that is, same Kakma.
- the UE When UE registers with a 5G core network, the UE sends a registration request to an AMF through a RAN.
- the registration request carries identity information of the UE.
- the AMF selects an AUSF based on the identity information of the UE (for example, a subscription concealed identifier (subscriber concealed identifier, SUCI)), and sends a message to the AUSF to trigger a primary authentication procedure.
- the AUSF authenticates the UE and sends an authentication parameter to the AMF.
- the AMF sends the authentication parameter to the UE through the RAN.
- Primary authentication in FIG. 3 is a process in which the AUSF authenticates the UE and the UE authenticates the AUSF in a registration process.
- the primary authentication may also be described as bidirectional authentication.
- the AUSF may generate Kakma by using an intermediate key generated in a primary authentication process, for example, Kausf, and generate key identifier information for Kakma.
- the key identifier information may be used to identify Kakma, for example, may be a Kakma identifier (identifier, ID).
- the UE After the primary authentication and before initiating an AKMA service, the UE generates Kakma by using an intermediate key generated in a primary authentication process, for example, Kausf, and generates key identifier information for Kakma.
- the AAnF may interact with the AUSF, obtain the key of the AKMA service from the AUSF, and generate a communication key between the AF and the UE and a validity period of the communication key based on the key of the AKMA service and an identifier of the AF.
- the AAnF may send the communication key and the validity period of the communication key to the AF, so that the AF can perform data transmission with the UE by using the communication key, and this improves data transmission security between the AF and the UE.
- the communication key between the AF and the UE may be, for example, Kaf.
- the UE before sending an application session establishment request to the AF, the UE performs a process of primary authentication and Kakma generation. After Kakma and the Kakma ID are generated, the AAnF may store Kakma corresponding to the Kakma ID. The UE sends, to the AF, an application session establishment request (for example, an application session establishment request) that carries the Kakma ID.
- an application session establishment request for example, an application session establishment request
- the AF When receiving the application session establishment request, the AF sends a key request (for example, a key request) to the AAnF, where the key request requests Kaf between the AF and the UE, and the key request carries the Kakma ID and an AF ID. If the AAnF stores Kakma corresponding to the Kakma ID, the AAnF directly generates Kaf and a validity period of Kaf based on Kakma and the AF ID. If the AAnF does not store Kakma corresponding to the Kakma ID, the AAnF sends an AKMA key request (for example, an AKMA key request) carrying the Kakma ID to the AUSF.
- a key request for example, a key request
- the AUSF searches for corresponding Kakma based on the Kakma ID, and sends an AKMA key response carrying Kakma to the AAnF.
- the AAnF generates Kaf and the validity period of Kaf based on Kakma and the AF ID.
- the AAnF sends a key response (for example, a key response) to the AF, where the key response carries Kaf and the validity period of Kaf.
- the AF After receiving the key response, the AF sends an application session establishment response (for example, an application session establishment response) to the UE.
- Kaf between different AFs and same UE may be different.
- Kaf between an AF 1 and UE 1 is Kaf 1
- Kaf between an AF 2 and the UE 1 is Kaf 2 .
- the AF may interact with a 3GPP core network element.
- the AF may obtain a quality of service (quality of service, QoS) parameter from a PCF, or the AF provides a QoS parameter for a PCF, and then data transmission of an application program may be affected.
- the AF may interact with an NEF.
- the AF obtains, from the AAnF, the communication key between the AF and the UE and the validity period of the communication key.
- the AF may be located inside or outside the 5G core network. If the AF is located inside the 5G core network, the AF may directly interact with the PCF. If the AF is located outside the 5G core network, the AF may interact with the PCF by using the NEF.
- the NEF may be used as an intermediate medium to provide an interaction service between an AF located outside the 5G core network and an AAnF in the 5G core network, and may further provide an interaction service between an AF located outside the 5G core network and a PCF in the 5G core network.
- the 5G system includes one AUSF.
- the AUSF may generate Kakma based on Kausf, and the AAnF may obtain Kakma from the AUSF, to generate Kaf between the AF and the UE.
- the 5G system may include a plurality of AUSFs, and how the AAnF determines an AUSF that stores Kausf is an urgent technical problem to be resolved.
- this application provides a communication system, method and apparatus, so that the AAnF can quickly and accurately determine the AUSF that stores Kausf.
- FIG. 5 is a schematic diagram of a network architecture according to this application.
- the network architecture shown in FIG. 5 is used to implement AKMA service-based data transmission between a terminal device and an application function network element.
- the network architecture shown in FIG. 5 may include a terminal device 101 , an authentication server function network element 102 , a unified data management network element 103 , an AKMA anchor function network element 104 , a network exposure function network element 105 , and an application function network element 106 .
- the application function network element is located outside a core network, and communicates with a core network element by using the network exposure function network element.
- the network exposure function network element may also be referred to as an AKMA interworking function (interworking function) network element.
- the network architecture shown in FIG. 5 may include a terminal device 101 , an authentication server function network element 102 , a unified data management network element 103 , an AKMA anchor function network element 104 , and an application function network element 106 .
- the application function network element is located inside a core network, and may directly communicate with a core network element.
- FIG. 5 a quantity of network elements in FIG. 5 is used as an example, and does not constitute a limitation on this embodiment of this application.
- a plurality of terminal devices, authentication server function network elements, application function network elements, and the like may be included.
- the authentication server function network element 102 may be an AUSF in a 5G core network, or may be a network element configured to implement a function of an AUSF in a future communication system.
- the unified data management network element 103 may be a UDM in a 5G core network, or may be a network element configured to implement a function of a UDM in a future communication system.
- the AKMA anchor function network element 104 may be the AAnF in FIG. 2 , or may be a network element configured to implement a function of an AAnF in a future communication system.
- the network exposure function network element 105 may be an NEF in a 5G core network, or may be a network element configured to implement a function of an NEF in a future communication system.
- the application function network element 106 may be an AF in the 5G system, or may be a network element configured to implement a function of an AF in a future communication system.
- the terminal device 101 is the UE
- the authentication server function network element 102 is the AUSF
- the unified data management network element 103 is the UDM
- the AKMA anchor function network element 104 is the AAnF
- the network exposure function network element 105 is the NEF
- the application function network element 106 is the AF is used for description.
- the NEF obtains first identification information from the UDM, and sends the first identification information to the AAnF, where the first identification information is used by the NEF or the AAnF to determine an AUSF corresponding to Kausf that stores related UE in a direct determining manner or in an auxiliary determining manner.
- the AUSF corresponding to Kausf of the UE may also be described as an AUSF corresponding to the UE.
- the direct determining manner means that the NEF or the AAnF may directly determine, by using the first identification information, the AUSF that stores Kausf, to be specific, the AUSF that stores Kausf may be determined without using the first identification information to obtain additional information.
- the auxiliary determining manner means that after receiving the first identification information, the NEF or the AAnF further needs to obtain additional information to determine the AUSF that stores Kausf.
- a method for directly determining the AUSF corresponding to Kausf of the UE may be:
- the first identification information is or includes identification information of the AUSF, for example, an AUSF ID.
- the identification information of the AUSF is information in which an AUSF corresponding to Kausf of the UE generates Kausf in a primary authentication process and stores the AUSF of Kausf.
- the information may be stored by the UDM.
- Function entities such as the AMF, the SMF, the NEF, and the AAnF may determine a unique AUSF based on the identification information of the AUSF.
- the AUSF is an AUSF that generates Kausf and stores Kausf in a primary authentication process for the AUSF corresponding to Kausf of the UE.
- an auxiliary determining method may be as follows: When receiving the first identification information, the AAnF obtains, from the UDM based on the first identification information, the identification information of the AUSF corresponding to Kausf of the UE, for example, an AUSF instance ID (AUSF instance identifier, AUSF ID). The AUSF corresponding to Kausf of the UE generates Kausf and stores Kausf in the primary authentication process, so that the AAnF can quickly and accurately determine the AUSF that stores Kausf.
- the NEF obtains the first identification information from the UDM, and sends the first identification information to the AAnF, where the first identification information is used by the NEF or the AAnF to determine an AUSF corresponding to Kausf that stores Kausf of related UE in a direct determining manner or in an auxiliary determining manner.
- the direct determining manner means that the NEF or the AAnF may directly determine, by using the first identification information, the AUSF that stores Kausf, to be specific, the AUSF that stores Kausf may be determined without using the first identification information to obtain additional information.
- the auxiliary determining manner means that after receiving the first identification information, the NEF or the AAnF further needs to obtain additional information to determine the AUSF that stores Kausf. For example, after the NEF obtains the first identification information, the NEF obtains, from the UDM based on the first identification information, the identification information of the AUSF corresponding to Kausf that stores the related UE, for example, the AUSF ID. The NEF sends, to the AAnF, the identification information of the AUSF corresponding to Kausf that stores the related UE. The AAnF receives the identification information of the AUSF from the NEF. The AUSF corresponding to Kausf of the UE generates Kausf and stores Kausf in the primary authentication process, so that the AAnF can quickly and accurately determine the AUSF that stores Kausf.
- the NEF receives a key request message from the AF, and sends the key request message to the AAnF, where the key request message includes second identification information.
- the AAnF obtains, from the UDM based on the second identification information, the identification information of the AUSF corresponding to Kausf of the UE.
- the AUSF corresponding to Kausf of the UE generates Kausf and stores Kausf in the primary authentication process. Therefore, the AAnF can accurately determine the AUSF that stores Kausf.
- the AAnF When the AAnF accurately determines the AUSF that stores Kausf, the AAnF obtains Kakma from the AUSF, may generate Kaf between the UE and the AF and a validity period of Kaf based on Kakma and the AF ID, and sends Kaf and the validity period of Kaf to the AF, so that the AF performs data transmission with the UE by using Kaf, and this improves data transmission security.
- FIG. 6 A and FIG. 6 B are a schematic flowchart of a communication method according to an embodiment of this application.
- the flowchart may include but is not limited to the following steps.
- Step 601 UE sends an application session establishment request message to an AF.
- the AF receives the application session establishment request message from the UE.
- the application session establishment request message may be, for example, an application session establishment request message, and is used to trigger establishment of a connection between the UE and the AF.
- the connection may be used for AKMA service-based data transmission between the UE and the AF.
- the application session establishment request message may include second identification information.
- the second identification information includes a Kakma ID, and the Kakma ID is unique.
- the Kakma ID that is unique may be used as routing information for searching for an AUSF corresponding to Kausf of the UE.
- the routing information of the AUSF refers to an initial condition that may be used for searching for and storing identification information of an AUSF corresponding to Kausf of related UE.
- a UDM, an NEF, or an AAnF may use the routing information of the AUSF as reference content to search for and finally obtain and store the identification information of the AUSF corresponding to Kausf of the related UE.
- a search process may be direct or indirect.
- a direct search process means that the identification information, for example, an AUSF ID, of the AUSF corresponding to Kausf of the related UE may be directly determined and stored based on the routing information of the AUSF.
- the UDM directly determines subscription data of an AKMA service of the UE and/or the identification information of the AUSF based on the Kakma ID, and may further determine the AUSF corresponding to Kausf of the UE. If there is only the subscription data of the AKMA service, it means that the identification information of the AUSF and the subscription data of the AKMA service are stored together.
- the UDM may directly determine, based on the Kakma ID, the identification information of the AUSF corresponding to Kausf of the UE.
- An indirect search process means that intermediate information needs to be first found by using the routing information of the AUSF, and then basic information that stores the identification information of the AUSF corresponding to Kausf of the related UE is finally obtained based on the intermediate information.
- the UDM may determine an SUPI of the UE based on the Kakma ID, and may determine, based on the SUPI of the UE, the identification information of the AUSF corresponding to Kausf of the UE.
- the Kakma ID is used as an initial condition of the routing information of the AUSF to obtain the intermediate information SUPI of the UE, and the intermediate information SUPI of the UE may be used by the UDM to search for the subscription data of the AKMA service of the UE and/or the identification information of the AUSF. Further, the AUSF corresponding to Kausf of the UE may be determined. If there is only the subscription data of the AKMA service, it means that the identification information of the AUSF and the subscription data of the AKMA service are stored together. For another example, the UDM may directly determine, based on the Kakma ID, the identification information of the AUSF corresponding to Kausf of the UE.
- the Kakma ID that is unique means that the Kakma ID can uniquely identify Kakma and uniquely find UE.
- a format of the Kakma ID may be a format that can be used as address information. Being used as the address information may be understood as a form similar to an email, that is, user name@address.
- the format of the Kakma ID may be a network access identifier (network access identifier, NAI) format, and the NAI format is specifically represented as value@3GPP network information.
- NAI network access identifier
- a value part is a key to reflect uniqueness of the Kakma ID, and a 3GPP network information part may be the same for each Kakma ID of one UE.
- the value part of the Kakma ID may have a plurality of forms, and a specific form may include at least one of a generated value, a fixed value, and a stable variation value.
- the generated value indicates that the kakma ID needs to be generated each time.
- the fixed value is a value that remains unchanged each time and has a special meaning.
- the stable variation value may be a counter that grows stably.
- the KDF is a key derived function. In a current technology, the KDF is used by the UE and the AUSF to generate a key Kseaf.
- the KDF is essentially a hash function, and is used as a key derivation algorithm in 3GPP.
- the key herein may be Kausf, or may be Kakma, or may be an intermediate key or a part of the intermediate key generated by using an authentication method other than 5G-authentication and key management (5G-authentication and key management, 5G-AKA) and enhanced EAP authentication and key agreement (EAP authentication and key agreement, EAP-AKA′).
- 5G-authentication and key management 5G-authentication and key management, 5G-AKA
- EAP authentication and key agreement EAP authentication and key agreement
- an extended master session key extended master session key
- EMSK extended master session key
- MSK master session key
- EAP-TLS extensible authentication protocol transport layer security
- the parameter 1 may indicate a purpose, for example, may be a character string “AKMA”, or may be an “AKMA ID”.
- the parameter 1 may alternatively indicate application (application, APP) information, for example, a character string “APP ID”.
- generated value KDF(key, sub-parameter 1, sub-parameter 1, parameter 2), or KDF(key, sub-parameter 1, sub-parameter 2, sub-parameter 2), or KDF(key, sub-parameter 1, sub-parameter 1), or KDF(key, sub-parameter 2, sub-parameter 2).
- an FC value is used. Input parameters traditionally used by 3GPP in key generation, such as the FC value, are not listed one by one herein. It should be further noted that an input sequence of the parameter 1 and the parameter 2 is not limited in the present invention.
- the AUSF may send the Kakma ID to the UDM, and the UDM stores the Kakma ID.
- the AUSF may send the Kakma ID by using a service—oriented message, for example, a UDM authentication result confirmation request message (Nudm_UEAuthentication_ResultConfirmation Request), or may send the Kakma ID by using a newly defined service—oriented message, for example, a Nudm_UEAKMA_InformationUpdate Request message.
- the UDM After receiving the Kakma ID, the UDM stores the value.
- the second identification information includes the Kakma ID and the routing information of the AUSF, and the Kakma ID is not unique.
- the routing information of the AUSF may include identity information of the UE.
- the SUCI may be one or more of an SUCI, a generic public subscription identifier (generic public subscription identifier, GPSI), or a globally unique temporary UE identity (globally unique temporary UE identity, GUTI).
- the SUCI may be generated by the UE.
- the UDM may decrypt the SUCI of the UE to obtain the SUPI of the UE, and then the UDM may search for subscription data of the AKMA service of the UE, to determine the AUSF corresponding to Kausf of the UE.
- the GPSI may be preconfigured on the UE and the UDM, and then the UDM may search for the subscription data of the AKMA service of the UE based on the GPSI, to determine the AUSF corresponding to Kausf of the UE.
- the GUTI may be allocated by the AMF and sent to the UE.
- the GUTI may be uniquely located to one AMF by a network.
- the AMF may uniquely locate the SUPI of the UE based on the GUTI, and may further find the AUSF corresponding to the SUPI of the UE, that is, the AUSF corresponding to Kausf of the UE.
- a core network element may obtain, from the UDM based on the GPSI or the SUCI, the AUSF that stores Kausf, that is, the AUSF corresponding to Kausf of the UE.
- the core network element may obtain, from the AMF based on the GUTI, the AUSF that stores Kausf.
- the core network element may be, for example, the AAnF.
- the AUSF may send the Kakma ID to the UDM, and the UDM stores the Kakma ID.
- the AUSF may send the Kakma ID by using a service—oriented message, for example, a UDM authentication result confirmation request message (Nudm_UEAuthentication_ResultConfirmation_Request), or may send the Kakma ID by using a newly defined service—oriented message, for example, a Nudm_UEAKMA_InformationUpdate Request message.
- the UDM After receiving the Kakma ID, the UDM stores the value.
- the second identification information includes the Kakma ID and a pseudonym of the AUSF, and the Kakma ID is not unique.
- the pseudonym of the AUSF may be allocated by an operator.
- An NRF may locate and determine, by combining the pseudonym of the AUSF with content such as a mobile country code (mobile country code, MCC) and a mobile network code (mobile network code, MNC), the identification information of the AUSF corresponding to Kausf of the UE, that is, the AUSF that stores Kausf.
- the core network element may obtain, from the NRF based on the pseudonym of the AUSF, the AUSF that stores Kausf.
- Step 602 The AF sends a key request message to the NEF.
- the NEF receives the key request message from the AF.
- the key request message may be, for example, a key request message, and requests a communication key between the AF and the UE, that is, Kaf between the AF and the UE.
- the key request message may include the second identification information, that is, the second identification information received by the AF from the UE.
- the key request message may alternatively include identification information of the AF, for example, an AF ID, used to identify an AF with which the UE performs AKMA service-based data transmission.
- the AF is located outside the 5G core network.
- the AF needs to use the NEF. Therefore, the AF sends the key request message to the NEF.
- the AF may send the key request message to the NEF when receiving the application session establishment request message, or may send the key request message to the NEF when Kaf between the AF and the UE expires. Kaf expires when, for example, current system time is not within a validity period of Kaf.
- Step 603 The NEF determines whether the AF authorizes the NEF to request a key.
- the NEF determines whether the AF authorizes the NEF to request the key, in other words, determines whether the AF authorizes the NEF to obtain Kaf between the AF and the UE from the AAnF.
- the NEF determines whether the AF authorizes the NEF to request the key refer to related descriptions in the current technology.
- step 604 is performed; or if the NEF is not authorized to request the key, the NEF feeds back a non-authorized notification message to the AF, so that the AF authorizes the NEF to request the key.
- This step is an optional step. This means that the NEF may not check whether the AF is authorized.
- Step 604 When a determining result in step 603 is yes, the NEF sends a first request message to the UDM. Correspondingly, the UDM receives the first request message from the NEF.
- the first request message may be, for example, a Nudm SDM Get message, and requests first identification information.
- the first request message may include the second identification information.
- the first request message may alternatively include the identification information of the AF, for example, the AF ID.
- the second identification information includes a Kakma ID that is unique.
- the UDM may determine the UE based on the Kakma ID, and then determine the first identification information, where the first identification information includes the SUPI of the UE.
- the second identification information includes a Kakma ID that is not unique and the identity information of the UE, and the identity information of the UE includes the GPSI or the SUCI.
- the UDM may determine the UE based on the GPSI or the SUCI, and further determine the first identification information, where the first identification information includes the SUPI of the UE.
- the second identification information includes the Kakma ID that is unique and the identity information of the UE, and the identity information of the UE includes the GPSI.
- the UDM may determine the UE based on the GPSI, and then determine the first identification information, where the first identification information includes the SUPI of the UE.
- the UDM determines the SUPI of the UE may be understood as that the UDM determines UE corresponding to the Kakma ID.
- the Kakma ID and/or the SUPI of the UE may be used by the UDM to further search for the subscription data of the AKMA service of the UE, and then determine the identification information of the AUSF corresponding to Kausf of the UE.
- the Kakma ID and/or the SUPI of the UE are/is used to determine the AUSF corresponding to Kausf of the UE.
- the first identification information is used to determine the AUSF corresponding to Kausf of the UE.
- Step 605 The UDM sends a first response message to the NEF.
- the NEF receives the first response message from the UDM.
- the first response message may be, for example, an Nudm SDM Get response message, and is used to respond to the first request message.
- the first response message includes the first identification information determined by the UDM.
- Step 606 The NEF sends the first identification information to the AAnF.
- an AAnF receives the first identification information from the NEF.
- the NEF When receiving the first identification information from the UDM, the NEF sends the first identification information to the AAnF, for example, sends the first identification information to the AAnF by using a submit Key Request message. In other words, the first identification information is carried in the submit Key Request message.
- the UDM may determine the UE based on the SUPI of the UE, and search for the subscription data of the AKMA service of the UE. Alternatively, the UDM may directly search for the subscription data of the AKMA service of the UE based on the SUPI of the UE.
- the submit Key Request message may further carry the identification information of the AF, for example, the AF ID, so that when obtaining Kakma, the AAnF generates Kaf between the UE and the AF and the validity period of Kaf based on Kakma and the AF ID.
- the submit Key Request message may further include the second identification information, that is, the second identification information received by the NEF from the AF.
- the second identification information includes the Kakma ID, so that after determining the AUSF corresponding to Kausf of the UE, the AAnF obtains Kakma corresponding to the Kakma ID from the AUSF.
- Step 607 The AAnF sends a second request message to the UDM.
- the UDM receives the second request message from the AAnF.
- the second request message may be, for example, an AKMA service request (AKMA service request) message, and requests the identification information of the AUSF corresponding to Kausf of the UE.
- AKMA service request AKMA service request
- the first identification information is used to obtain data related to the AKMA service of the UE, and may include the identification information of the AUSF corresponding to Kausf of the UE, and may further include the subscription data of the AKMA service of the UE.
- the first identification information includes the SUPI of the UE, and the UDM may search for the subscription data of the AKMA service of the UE based on the SUPI of the UE.
- the second identification information includes the Kakma ID that is unique.
- the UDM may determine the UE based on the Kakma ID, and then obtain data related to the AKMA service of the UE, including the identification information that determines the AUSF corresponding to Kausf of the UE, and the subscription data of the AKMA service of the UE may also be included.
- the subscription data of the AKMA service of the UE may include the identification information of the AUSF corresponding to Kausf of the UE, and the identification information of the AUSF corresponding to Kausf of the UE may be an AUSF ID corresponding to Kausf of the UE, address information of the AUSF corresponding to Kausf of the UE, serving node (serving node) information of the AUSF corresponding to Kausf of the UE, or the like.
- the subscription data of the AKMA service of the UE may alternatively include one or more of information such as an AKMA service that can be used by the UE, information about an AF that can provide the AKMA service, or slice information.
- the AKMA service that can be used by the UE may be represented by a data network name (data network name, DNN).
- the AF information may be information about binding between the AF ID and the DNN.
- the slice information may be, for example, network slice selection assistance information (network slice selection assistance information, NSSAI).
- the identification information of the AUSF corresponding to Kausf of the UE is not carried in the subscription data of the AKMA service of the UE.
- the UDM may determine, based on the subscription data of the AKMA service of the UE, the identification information of the AUSF corresponding to Kausf of the UE.
- the UDM may search for, based on the determined UE, the AUSF corresponding to Kausf of the UE, to determine the identification information of the AUSF corresponding to Kausf of the UE.
- Step 608 The UDM sends a second response message to the AAnF.
- the AAnF receives the second response message from the UDM.
- the UDM When determining the identification information of the AUSF corresponding to Kausf of the UE, the UDM sends the second response message to the AAnF.
- the second response message may be, for example, an AKMA service response (AKMA service response) message, and is used to respond to the second request message.
- AKMA service response AKMA service response
- the second response message includes the subscription data of the AKMA service of the UE, and the subscription data of the AKMA service of the UE includes the identification information of the AUSF corresponding to Kausf of the UE.
- the second response message includes the subscription data of the AKMA service of the UE and the identification information of the AUSF corresponding to Kausf of the UE.
- the AAnF may perform authorization detection based on the subscription data of the AKMA service of the UE. Specifically, the AAnF may check and determine whether the UE can perform the AKMA service by using the AF indicated by the AF ID. If the authorization detection succeeds, step 609 is performed. It should be noted herein that this application provides three methods for the AAnF to obtain the subscription data of the AKMA service of the UE.
- One method is that the AAnF directly obtains the subscription data of the AKMA service of the UE by using the UDM (step 608 ), one method is that the AAnF obtains the subscription data of the AKMA service of the UE by using the NEF (step 808 ), and one method is that the AAnF obtains the subscription data of the AKMA service of the UE by using the AUSF (step 611 ).
- the three methods do not need to be implemented together. Only one of them needs to be used.
- Step 609 The AAnF determines the AUSF corresponding to Kausf of the UE.
- the AAnF may determine, based on the identification information of the AUSF corresponding to Kausf of the UE, the AUSF corresponding to Kausf of the UE.
- the AAnF performs authorization detection on the UE and/or the AF.
- the AAnF performs authorization detection on the UE. Specifically, the AAnF determines, based on the subscription data of the AKMA service of the UE, whether the UE can use the AKMA service. If it is determined that the UE can use the AKMA service, the UE passes the authorization detection. If it is determined that the UE cannot use the AKMA service, the AAnF does not perform step 610 , and feeds back, to the AF by using the NEF, a notification message indicating that the UE cannot use the AKMA service.
- the AAnF performs authorization detection on the AF. Specifically, the AAnF determines, based on the subscription data of the AKMA service of the UE, whether the AF can provide the AKMA service for the UE. If the AF can provide the AKMA service for the UE, the AF passes the authorization detection. If the AF cannot provide the AKMA service for the UE, the AAnF does not perform step 610 , and feeds back, to the AF by using the NEF, a notification message indicating that the AF cannot provide the AKMA service for the UE. For example, whether the subscription data of the AKMA service of the UE includes the AF ID is determined.
- the AF may provide the AKMA service for the UE; or if the subscription data does not include the AF ID, the AF cannot provide the AKMA service for the UE. For another example, whether the service that can be provided by the AF is included in the AKMA service that can be used by the UE. If the service is included, the AF may provide the AKMA service for the UE. If the service is not included, the AF cannot provide the AKMA service for the UE.
- the AAnF may determine, based on the identification information of the AUSF corresponding to Kausf of the UE, the AUSF corresponding to Kausf of the UE.
- Step 610 The AAnF sends an AKMA key request message to the AUSF.
- the AUSF receives the key request message from the AAnF.
- the AAnF sends the AKMA key request message to the AUSF corresponding to Kausf of the UE, where the AKMA key request message includes the Kakma ID.
- the AKMA key request message may be, for example, an AKMA key request message, and requests Kakma corresponding to the Kakma ID.
- Step 611 The AUSF sends an AKMA key response message to the AAnF.
- the AAnF receives the AKMA key response message from the AUSF.
- the AUSF When receiving the AKMA key request message carrying the Kakma ID, the AUSF determines, based on the Kakma ID, Kakma corresponding to the Kakma ID, and sends, to the AAnF by using the AKMA key response message, Kakma corresponding to the Kakma ID. That is, the Kakma is carried in the AKMA key response message.
- the AKMA key response message may be, for example, an AKMA key response message, and is used to respond to the AKMA key request message.
- the AKMA key response message may include the subscription data of the AKMA service of the UE.
- Step 612 The AAnF generates Kaf and a validity period of Kaf.
- the AAnF generates Kaf and the validity period of Kaf based on Kakma and the AF ID.
- the AAnF may perform authorization detection based on the subscription data of the AKMA service of the UE. Specifically, the AAnF may check and determine whether the UE can perform the AKMA service by using the AF indicated by the AF ID. For specific authorization detection, refer to descriptions of the authorization detection in step 609 . If the authorization detection succeeds, step 612 is performed.
- Step 613 The AAnF sends Kaf and the validity period of Kaf to the NEF.
- the NEF receives Kaf and the validity period of Kaf from the AAnF.
- the AAnF may send Kaf and the validity period of Kaf to the NEF by using a submit key response confirm message, in other words, the validity period of Kaf and Kaf are carried in the submit key response confirm message.
- Step 614 The NEF sends a key response message to the AF.
- the AF receives the key response message from the NEF.
- the key response message may be, for example, a key response message, and is used to respond to the key request message in step 602 .
- the key response message includes Kaf and the validity period of Kaf.
- Step 615 The AF sends an application session establishment response message to the UE.
- the UE receives the application session establishment response message from the AF.
- the application session establishment response message may be, for example, an application session establishment response message, and is used to respond to the application session establishment request message in step 601 .
- the AF may encrypt, within the validity period of Kaf by using Kaf, data sent by the AF to the UE, so that data transmission security can be improved.
- the UE may decrypt the data by using Kaf.
- a process in which the UE generates Kaf is similar to a process in which the AAnF generates Kaf. Refer to related descriptions in the current technology.
- the NEF obtains the first identification information from the UDM, and sends the first identification information to the AAnF.
- the AAnF obtains, from the UDM based on the first identification information, the identification information of the AUSF corresponding to Kausf of the UE. Therefore, the AAnF can quickly and accurately determine the AUSF that stores Kausf.
- FIG. 6 A and FIG. 6 B an example in which the AF is located outside the core network is used. If the AF is located inside the core network, related steps of interaction with the NEF in FIG. 6 A and FIG. 6 B may be deleted, for example, step 603 and step 606 , and step 604 and step 605 are changed to an interaction procedure between the AAnF and the UDM.
- step 701 to step 705 are further included, as shown in FIG. 7 .
- Step 701 UE and an AUSF perform a primary authentication process.
- the UE and the AUSF perform the primary authentication process.
- the UE and the AUSF perform the primary authentication process.
- the primary authentication process For details, refer to detailed descriptions of the primary authentication process in FIG. 3 . Details are not described herein again.
- Step 702 The AUSF generates Kakma and a Kakma ID.
- the AUSF uses Kausf generated during the primary authentication process to generate Kakma and generates the Kakma ID for Kakma.
- the Kakma ID generated by the AUSF is unique, that is, the Kakma ID is globally unique.
- One Kakma ID is used to uniquely identify one Kakma, and different Kakma correspond to different Kakma IDs.
- the Kakma ID is unique, one Kakma ID may independently identify one UE, and different UEs correspond to different Kakma IDs. It may be understood that the AUSF may generate different Kakma and Kakma IDs for the different UEs.
- the Kakma ID generated by the AUSF is not unique. In other words, the Kakma ID is not globally unique. Further, the Kakma ID is not unique, and one Kakma ID cannot independently identify one UE.
- Step 703 The AUSF sends the Kakma ID to a UDM.
- the AUSF sends a UE authentication result confirmation request message or a newly defined service—oriented message to the UDM.
- the UDM receives the UE authentication result confirmation request message from the AUSF, or receives the newly defined service-based message.
- Step 703 and step 704 are described by using an example in which the service-based message is the UE authentication result confirmation request message and a UE authentication result confirmation response message respectively.
- the UE authentication result confirmation request message may include a subscriber permanent identifier (subscriber permanent identifier, SUPI) of the UE and an AUSF ID.
- the SUPI of the UE is used to identify the UE.
- the AUSF ID is used to identify an AUSF corresponding to Kausf of the UE, that is, used to identify an AUSF that stores Kausf.
- the UE authentication result confirmation request message carries the Kakma ID, which can be used by the UDM to search for subscription data of an AKMA service of the UE.
- the UE authentication result confirmation request message may also include the Kakma ID.
- Step 704 The UDM sends the UE authentication result confirmation response message to the AUSF.
- the AUSF receives the UE authentication result confirmation response message from the UDM.
- the UDM before the UDM sends the UE authentication result confirmation response message to the AUSF, if the UE authentication result confirmation request message carries the Kakma ID, the UDM stores the Kakma ID in the subscription data of the AKMA service of the UE, so that when the UDM receives a second request message, the subscription data of the AKMA service of the UE may be searched for based on first identification information.
- the UDM replies with the subscription data of the AKMA service of the UE in the UE authentication result confirmation response message.
- the AUSF stores the subscription data of the UE.
- the AUSF may send the stored subscription data of the AKMA service of the UE corresponding to the Kakma ID to the AAnF.
- the AAnF may perform authorization detection based on the subscription data of the AKMA service. Specifically, the AAnF may check and determine whether the UE can perform the AKMA service by using the AF indicated by the AF ID. For specific descriptions, refer to step 609 . If the authorization detection succeeds, step 612 is performed. When the AF is inside a SGC, the AAnF can obtain the subscription data of the AKMA service by using this method.
- Step 705 The UE generates Kakma and the Kakma ID.
- the UE uses Kausf to generate Kakma and generates the Kakma ID for Kakma.
- FIG. 8 A and FIG. 8 B are a schematic flowchart of another communication method according to an embodiment of this application.
- the flowchart may include but is not limited to the following steps.
- Step 801 UE sends an application session establishment request message to an AF.
- the AF receives the application session establishment request message from the UE.
- Step 802 The AF sends a key request message to an NEF.
- the NEF receives the key request message from the AF.
- Step 803 The NEF determines whether the AF authorizes the NEF to request a key.
- Step 804 When a determining result in step 803 is yes, the NEF sends a first request message to the UDM. Correspondingly, the UDM receives the first request message from the NEF.
- Step 805 The UDM sends a first response message to the NEF.
- the NEF receives the first response message from the UDM.
- step 801 to step 805 For an implementation process of step 801 to step 805 , refer to specific descriptions of step 601 to step 605 in the procedure shown in FIG. 6 A and FIG. 6 B . Details are not described herein again.
- Step 806 The NEF sends first identification information to the UDM.
- an AAnF receives the first identification information from the NEF.
- the first identification information sent by the NEF to the UDM may be carried in an Nudm_UECM_Get message.
- the first identification information for example, an SUPI of the UE, requests subscription data of the UE.
- the Nudm_UECM_Get message may alternatively carry AKMA service indication information.
- the Nudm_UECM_Get message carries the SUPI of the UE and the AKMA service indication information, and requests data related to the AKMA service, for example, subscription data of the AKMA service of the UE and identification information of an AUSF corresponding to Kausf of the UE.
- the AKMA service indication information indicates that related content of the AKMA service is requested, and specifically, “AKMA” may be used as the indication information.
- Nudm_UECM_Get (SUPI, AKMA).
- Step 807 The UDM sends, to the NEF, the identification information of the AUSF corresponding to Kausf of the UE.
- the NEF receives the identification information of the AUSF corresponding to Kausf of the UE from the UDM.
- the UDM determines, based on the SUPI of the UE and the AKMA service indication information, the subscription data of the AKMA service of the UE and/or the identification information of the AUSF corresponding to Kausf of the UE.
- the subscription data of the AKMA service of the UE may include the identification information of the AUSF corresponding to Kausf of the UE.
- the identification information of the AUSF corresponding to Kausf of the UE is not carried in the subscription data of the AKMA service of the UE. In this case, the identification information of the AUSF corresponding to Kausf of the UE and/or the subscription data of the AKMA service of the UE may be carried.
- the UDM determines the data related to the AKMA service of the UE.
- the determining includes determining at least one of the identification information of the AUSF corresponding to Kausf of the UE and the subscription data of the AKMA service of the UE.
- the identification information of the AUSF corresponding to Kausf of the UE may be sent to the NEF.
- the identification information of the AUSF corresponding to Kausf of the UE may be sent to the NEF by using an Nudm_UECM_Get response message.
- the Nudm_UECM_Get response message may include the identification information of the AUSF corresponding to Kausf of the UE and the subscription data of the AKMA service of the UE.
- Step 804 to step 807 are an implementation.
- the NEF first obtains the first identification information from the UDM, and then the NEF obtains, from the UDM based on the first identification information, the identification information of the AUSF corresponding to Kausf of the UE.
- step 804 and step 806 are combined, and step 805 and step 807 are combined.
- the NEF directly obtains, from the UDM, the first identification information and the identification information of the AUSF corresponding to Kausf of the UE.
- the NEF sends the first request message to the UDM, where the first request message includes second identification information, and specifically includes the Kakma ID and/or identity information of the UE.
- the UDM When receiving the first request message, the UDM determines the SUPI of the UE based on the Kakma ID and/or the identity information of the UE, and then determines data related to the AKMA service of the UE.
- the data related to the AKMA service may include the identification information of the AUSF corresponding to Kausf of the UE, and may further include the subscription data of the AKMA service of the UE.
- the UDM sends the first response message to the NEF, where the first response message includes the first identification information and the identification information of the AUSF corresponding to Kausf of the UE.
- the identification information of the AUSF corresponding to Kausf of the UE may be carried in the subscription data of the AKMA service of the UE, or may not be carried in the subscription data of the AKMA service of the UE.
- Step 808 The NEF sends, to the AAnF, the identification information of the AUSF corresponding to Kausf of the UE.
- the AAnF receives the identification information of the AUSF corresponding to Kausf of the UE from the NEF.
- the NEF may send, to the AAnF by using a submit Key Request message, the identification information of the AUSF corresponding to Kausf of the UE.
- the submit Key Request message may alternatively include an AF ID.
- the submit Key Request message may further include the second identification information, for example, the Kakma ID, so that after determining the AUSF corresponding to Kausf of the UE, the AAnF obtains Kakma corresponding to the Kakma ID from the AUSF. If the subscription data of the AKMA service of the UE is obtained in step 807 , the subscription data of the AKMA service of the UE further needs to be included in this step.
- Step 809 The AAnF determines the AUSF corresponding to Kausf of the UE.
- the AAnF may determine, based on the identification information of the AUSF corresponding to Kausf of the UE, the AUSF corresponding to Kausf of the UE.
- the AAnF performs authorization detection on the AF. Specifically, the AAnF may determine, based on the AF ID and preconfiguration information, whether the AF can provide the AKMA service for the UE.
- the preconfiguration information may be configured by an operator by using a management plane.
- the AAnF performs authorization detection on the UE and/or the AF.
- the subscription data of the AKMA service of the UE is carried in step 808 , before determining the AUSF corresponding to Kausf of the UE, the AAnF performs authorization detection on the UE and/or the AF.
- the AAnF performs authorization detection on the UE and/or the AF.
- Step 810 The AAnF sends an AKMA key request message to the AUSF.
- the AUSF receives the key request message from the AAnF.
- Step 811 The AUSF sends an AKMA key response message to the AAnF.
- the AAnF receives the AKMA key response message from the AUSF.
- Step 812 The AAnF generates Kaf and a validity period of Kaf.
- Step 813 The AAnF sends Kaf and the validity period of Kaf to the NEF.
- the NEF receives Kaf and the validity period of Kaf from the AAnF.
- Step 814 The NEF sends the key response message to the AF.
- the AF receives the key response message from the NEF.
- Step 815 The AF sends an application session establishment response message to the UE.
- the UE receives the application session establishment response message from the AF.
- step 810 to step 815 For an implementation process of step 810 to step 815 , refer to specific descriptions of step 610 to step 615 in the procedure shown in FIG. 6 A and FIG. 6 B . Details are not described herein again.
- the NEF obtains the first identification information from the UDM, obtains, from the UDM based on the first identification information, the identification information of the AUSF corresponding to Kausf of the UE, and sends the identification information of the AUSF corresponding to Kausf of the UE to the AAnF. Therefore, the AAnF can quickly and accurately determine the AUSF that stores Kausf.
- FIG. 8 A and FIG. 8 B an example in which the AF is located outside the core network is used. If the AF is located inside the core network, related steps of interaction with the NEF in FIG. 8 A and FIG. 8 B may be deleted, for example, step 803 and step 808 , and step 804 to step 807 are changed to an interaction procedure between the AAnF and the UDM.
- step 801 step 701 to step 705 are further included, as shown in FIG. 7 .
- step 701 to step 705 are further included, as shown in FIG. 7 .
- FIG. 7 For details, refer to the descriptions of FIG. 7 .
- FIG. 9 is a schematic flowchart of still another communication method according to an embodiment of this application.
- the flowchart may include but is not limited to the following steps.
- Step 901 UE sends an application session establishment request message to an AF.
- the AF receives the application session establishment request message from the UE.
- Step 902 The AF sends a key request message to an NEF.
- the NEF receives the key request message from the AF.
- step 901 and step 902 For implementation processes of step 901 and step 902 , refer to specific descriptions of step 601 and step 602 in the procedure shown in FIG. 6 A and FIG. 6 B . Details are not described herein again.
- Step 903 The NEF sends the key request message to an AAnF.
- the AAnF receives the key request message from the NEF.
- Step 904 The AAnF sends second identification information to the UDM.
- the UDM receives the second identification information from the AAnF.
- the AAnF may send the second identification information to the UDM by using an Nudm_UECM_Get message.
- the Nudm_UECM_Get message includes the second identification information and AKMA service indication information.
- AKMA service indication information refer to descriptions of the AKMA service indication information in step 806 .
- the UDM determines an SUPI of the UE based on the second identification information, and determines, based on the SUPI of the UE and the AKMA service indication information, subscription data of an AKMA service of the UE and/or identification information of an AUSF corresponding to Kausf of the UE.
- the Nudm_UECM_Get message includes the second identification information.
- the UDM determines an SUPI of the UE based on the second identification information, and determines, based on the SUPI of the UE, subscription data of an AKMA service of the UE and/or identification information of an AUSF corresponding to Kausf of the UE.
- Step 905 The UDM sends, to the AAnF, the identification information of the AUSF corresponding to Kausf of the UE.
- the AAnF receives the identification information of the AUSF corresponding to Kausf of the UE from the UDM.
- the UDM may send, to the AAnF by using an Nudm_UECM_Get response message, the identification information of the AUSF corresponding to Kausf of the UE.
- the Nudm_UECM_Get response message may include the identification information of the AUSF corresponding to Kausf of the UE and the subscription data of the AKMA service of the UE.
- Step 906 The AAnF determines the AUSF corresponding to Kausf of the UE.
- step 906 if the AAnF receives the subscription data of the AKMA service of the UE, for step 906 , refer to corresponding descriptions in step 609 . Details are not described herein again.
- step 906 if the AAnF does not receive the subscription data of the AKMA service of the UE, for step 906 , refer to corresponding descriptions in step 809 . Details are not described herein again.
- Step 907 The AAnF sends an AKMA key request message to the AUSF.
- the AUSF receives the key request message from the AAnF.
- Step 908 The AUSF sends an AKMA key response message to the AAnF.
- the AAnF receives the AKMA key response message from the AUSF.
- Step 909 The AAnF generates Kaf and a validity period of Kaf.
- Step 910 The AAnF sends Kaf and the validity period of Kaf to the NEF.
- the NEF receives Kaf and the validity period of Kaf from the AAnF.
- Step 911 The NEF sends the key response message to the AF.
- the AF receives the key response message from the NEF.
- Step 912 The AF sends an application session establishment response message to the UE.
- the UE receives the application session establishment response message from the AF.
- step 907 to step 912 For an implementation process of step 907 to step 912 , refer to specific descriptions of step 610 to step 615 in the procedure shown in FIG. 6 A and FIG. 6 B . Details are not described herein again.
- the NEF when receiving the key request message from the AF, the NEF directly forwards the key request message to the AAnF, and the AAnF autonomously obtains, from the UDM, the identification information of the AUSF corresponding to Kausf of the UE. Therefore, the AAnF can quickly and accurately determine the AUSF corresponding to Kausf of the UE.
- step 701 to step 705 are further included, as shown in FIG. 7 .
- step 701 to step 705 are further included, as shown in FIG. 7 .
- FIG. 7 For details, refer to the descriptions of FIG. 7 .
- step 903 may be deleted from FIG. 9 .
- an embodiment of this application further provides a corresponding apparatus.
- the apparatus includes corresponding modules configured to perform the foregoing embodiments.
- the module may be software, hardware, or a combination of software and hardware.
- FIG. 10 is a schematic diagram of a structure of a communication apparatus according to this application.
- the communication apparatus 1000 shown in FIG. 10 includes a transceiver module 1001 and a processing module 1002 .
- the apparatus 1000 is an AAnF.
- the processing module 1002 is configured to: receive, by using the transceiver module 1001 , first identification information from a network exposure function network element, where the first identification information is used to determine an authentication server function network element corresponding to a terminal device; and obtain, from a unified data management network element based on the first identification information, identification information of the authentication server function network element corresponding to the terminal device.
- the first identification information includes an SUPI of the terminal device.
- the processing module 1002 is specifically configured to: send, by using the transceiver module 1001 , a second request message to the unified data management network element, where the second request message includes an SUPI of the terminal device, and the second request requests the unified data management network element to determine, based on the SUPI of the terminal device, the identification information of the authentication server function network element corresponding to the terminal device; and receive a second response message from the unified data management network element, where the second response message includes the identification information of the authentication server function network element corresponding to the terminal device.
- the second response message further includes subscription data of an AKMA service of the terminal device.
- the processing module 1002 is further configured to: receive, by using the transceiver module 1001 , an identifier of an application function network element from a network exposure function network element; and obtain, from the authentication server function network element corresponding to the terminal device, a key that is of the AKMA service and that is identified by identification information of the key of the AKMA service.
- the processing module 1002 is further configured to generate a communication key between the application function network element and the terminal device based on the identifier of the application function network element and the key of the AKMA service.
- the processing module 1002 is further configured to send, by using the transceiver module 1001 , the communication key to the application function network element by using the network exposure function network element.
- the processing module 1002 is further configured to: perform authorization detection on the terminal device or the application function network element, and when completing the authorization detection, determine the authentication server function network element identified by the identification information of the authentication server function network element corresponding to the terminal device.
- the authentication server function network element corresponding to the terminal device is an authentication server function network element corresponding to an intermediate key of the terminal device, and stores the intermediate key generated by the authentication server function network element in a primary authentication process.
- the example is used to implement the function of the AAnF in the embodiment shown in FIG. 6 A and FIG. 6 B .
- the apparatus 1000 is further configured to implement the function of the AAnF in the embodiments shown in FIG. 8 A and FIG. 8 B and FIG. 9 .
- FIG. 8 A and FIG. 8 B For details, refer to corresponding descriptions of the AAnF in FIG. 6 A and FIG. 6 B , FIG. 8 A and FIG. 8 B , and FIG. 9 .
- the apparatus 1000 is an NEF.
- the processing module 1002 is configured to: obtain, by using the transceiver module 1001 , first identification information from the unified data management network element, where the first identification information is used to determine the authentication server function network element corresponding to the terminal device, and send the first identification information to an AKMA anchor function network element.
- the processing module 1002 is specifically configured to: receive, by using the transceiver module 1001 , second identification information from the application function network element; send a first request message to the unified data management network element when determining that the application function network element authorizes the network exposure function network element to request a key, where the first request message includes the second identification information, and requests the unified data management network element to determine the first identification information based on the second identification information; and receive a first response message from the unified data management network element, where the first response message includes the first identification information.
- the second identification information includes identification information of a key of the AKMA service
- the first identification information includes an SUPI of the terminal device.
- the second identification information includes identification information of a key of the AKMA service and temporary identity information of the terminal device
- the first identification information includes an SUPI of the terminal device
- the processing module 1002 is further configured to: receive, by using the transceiver module 1001 , the identifier of the application function network element, and send the identifier of the application function network element to an AKMA anchor function network element.
- the authentication server function network element corresponding to the terminal device is an authentication server function network element corresponding to an intermediate key of the terminal device, and stores the intermediate key generated by the authentication server function network element in a primary authentication process.
- the example is used to implement the function of the NEF in the embodiment shown in FIG. 6 A and FIG. 6 B .
- the apparatus 1000 is further configured to implement the function of the NEF in the embodiments shown in FIG. 8 A and FIG. 8 B and FIG. 9 .
- FIG. 8 A and FIG. 8 B For details, refer to corresponding descriptions of the NEF in FIG. 6 A and FIG. 6 B , FIG. 8 A and FIG. 8 B , and FIG. 9 .
- FIG. 11 is a schematic diagram of a structure of another communication apparatus according to this application.
- a communication apparatus 1100 shown in FIG. 11 includes at least one processor 1101 and a memory 1102 , and optionally, may further include a communication interface 1103 .
- the memory 1102 may be a volatile memory such as a random access memory.
- the memory may be a non-volatile memory such as a read-only memory, a flash memory, a hard disk drive (hard disk drive, HDD), or a solid-state drive (solid-state drive, SSD).
- the memory 1102 is any other medium that can be used to carry or store expected program code in an instruction form or a data structure form and that can be accessed by a computer, but is not limited thereto.
- the memory 1102 may be a combination of the foregoing memories.
- a specific connection medium between the processor 1101 and the memory 1102 is not limited.
- the memory 1102 and the processor 1101 are connected through a bus 1104 .
- the bus 1104 is represented by using a bold line in the figure, and a connection manner between other parts is merely used as an example for description, and does not limit this application.
- the bus 1104 may be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one bold line is used to represent the bus in FIG. 11 , but this does not mean that there is only one bus or only one type of bus.
- the processor 1101 may have a data transceiver function, and can communicate with another device.
- an independent data transceiver module for example, the communication interface 1103 , may also be disposed and is configured to receive and send data.
- the processor 1101 may transmit data through the communication interface 1103 .
- the processor in FIG. 11 may invoke computer-executable instructions stored in the memory 1102 , so that the AAnF is enabled to perform the method performed by the AAnF in any one of the foregoing method embodiments.
- the processor in FIG. 11 may invoke the computer-executable instructions stored in the memory 1102 , so that the NEF is enabled to perform the method performed by the NEF in any one of the foregoing method embodiments.
- functions/implementation processes of the processing module and the transceiver module in FIG. 10 may be implemented by the processor 1101 in FIG. 11 invoking the computer-executable instructions stored in the memory 1102 .
- functions/implementation processes of the processing module in FIG. 10 may be implemented by the processor 1101 in FIG. 11 invoking the computer-executable instructions stored in the memory 1102
- functions/implementation processes of the transceiver module in FIG. 8 A and FIG. 8 B may be implemented through the communication interface 1103 in FIG. 11 .
- An embodiment of this application further provides a communication system.
- the system may include the AAnF and the NEF in FIG. 6 A and FIG. 6 B to FIG. 9 , and optionally, may further include the UDM, the UE, the AF, and the AUSF in FIG. 6 A and FIG. 6 B to FIG. 9 .
- some optional features in embodiments of this application may be independently implemented without depending on another feature, for example, a solution on which the optional features are currently based, to resolve a corresponding technical problem and achieve a corresponding effect.
- the optional features are combined with other features based on requirements.
- the apparatus provided in embodiments of this application may also correspondingly implement these features or functions. Details are not described herein.
- the general-purpose processor may be a microprocessor.
- the general-purpose processor may alternatively be any conventional processor, controller, microcontroller, or state machine.
- the processor may alternatively be implemented by a combination of computing apparatuses, such as a digital signal processor and a microprocessor, a plurality of microprocessors, one or more microprocessors in combination with a digital signal processor core, or any other similar configuration.
- the memory in embodiments of this application may be a volatile memory or a non-volatile memory, or may include a volatile memory and a non-volatile memory.
- the non-volatile memory may be a read-only memory (read-only memory, ROM), a programmable read-only memory (programmable ROM, PROM), an erasable programmable read-only memory (erasable PROM, EPROM), an electrically erasable programmable read-only memory (electrically EPROM, EEPROM), or a flash memory.
- the volatile memory may be a random access memory (random access memory, RAM), used as an external cache.
- RAMs may be used, for example, a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), a synchronous dynamic random access memory (synchronous DRAM, SDRAM), a double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), an enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), a synchlink dynamic random access memory (synchlink DRAM, SLDRAM), and a direct rambus random access memory (direct rambus RAM, DR RAM).
- static random access memory static random access memory
- DRAM dynamic random access memory
- DRAM dynamic random access memory
- SDRAM synchronous dynamic random access memory
- double data rate SDRAM double data rate SDRAM
- DDR SDRAM double data rate SDRAM
- ESDRAM enhanced synchronous dynamic random access memory
- synchlink dynamic random access memory synchlink dynamic random access memory
- direct rambus RAM direct rambus RAM
- This application further provides a computer-readable medium storing a computer program.
- the computer program When the computer program is executed by a computer, functions of any one of the foregoing method embodiments are implemented.
- This application further provides a computer program product.
- the computer program product is executed by a computer, functions of any one of the foregoing method embodiments are implemented.
- All or some of the foregoing embodiments may be implemented by software, hardware, firmware, or any combination thereof.
- software is used to implement embodiments, all or some of the embodiments may be implemented in a form of a computer program product.
- the computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on a computer, all or some of the procedures or functions according to embodiments of this application are generated.
- the computer may be a general-purpose computer, a dedicated computer, a computer network, or another programmable apparatus.
- the computer instructions may be stored in a computer-readable storage medium or may be transmitted from one computer-readable storage medium to another computer-readable storage medium.
- the computer instructions may be transmitted from a website, computer, server, or data center to another website, computer, server, or data center in a wired (for example, a coaxial cable, an optical fiber, or a digital subscriber line (digital subscriber line, DSL)) or wireless (for example, infrared, radio, or microwave) manner.
- the computer-readable storage medium may be any usable medium accessible by a computer, or a data storage device, such as a server or a data center, integrating one or more usable media.
- the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk drive, or a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), a semiconductor medium (for example, a solid-state drive (solid state disc, SSD)), or the like.
- a magnetic medium for example, a floppy disk, a hard disk drive, or a magnetic tape
- an optical medium for example, a high-density digital video disc (digital video disc, DVD)
- a semiconductor medium for example, a solid-state drive (solid state disc, SSD)
- an embodiment mentioned in the entire specification means that particular features, structures, or characteristics related to the embodiment are included in at least one embodiment of this application. Therefore, embodiments in the entire specification do not necessarily refer to a same embodiment. In addition, these particular features, structures, or characteristics may be combined in one or more embodiments by using any appropriate manner. It may be understood that sequence numbers of the foregoing processes do not mean an execution sequence in various embodiments of this application. The execution sequence of the processes should be determined based on functions and internal logic of the processes, and should not be construed as any limitation on the implementation processes of embodiments of this application.
- “Simultaneously” in this application may be understood as being at a same time point, may be understood as being within a time period, or may be understood as being within a same periodicity.
- an element represented in a singular form is intended to represent “one or more”, but is not intended to represent “one and only one”.
- “at least one” is intended to represent “one or more”
- “a plurality of” is intended to represent “two or more”.
- system and “network” may be used interchangeably in this specification.
- network may be used interchangeably in this specification.
- the term “and/or” in this specification describes only an association relationship for describing associated objects and represents that three relationships may exist.
- a and/or B may represent the following three cases: only A exists, both A and B exist, and only B exists.
- A may be singular or plural, and B may be singular or plural.
- B corresponding to A indicates that B is associated with A, and B may be determined based on A.
- determining B based on A does not mean that B is determined based only on A.
- B may alternatively be determined based on A and/or other information.
- the correspondences shown in the tables in this application may be configured, or may be predefined. Values of the information in the tables are only examples, and other values may be configured. This is not limited in this application. When a correspondence between information and each parameter is configured, not all correspondences shown in the tables need to be configured. For example, in the tables in this application, correspondences shown in some rows may alternatively not be configured. For another example, proper deformations and adjustments such as splitting and combination may be performed based on the foregoing tables. Names of the parameters shown in titles of the foregoing tables may alternatively be other names that can be understood by a communication apparatus, and values or representation manners of the parameters may alternatively be other values or representation manners that can be understood by the communication apparatus.
- another data structure such as an array, a queue, a container, a stack, a linear table, a pointer, a linked list, a tree, a graph, a structure, a class, a pile, or a hash table, may alternatively be used.
- Predefine in this application may be understood as “define”, “predefine”, “store”, “pre-store”, “pre-negotiate”, “pre-configure”, “solidify”, or “pre-burn”.
- the system, apparatus, and method described in this application may alternatively be implemented in another manner.
- the foregoing apparatus embodiments are merely examples.
- division of the units is merely logical function division and may be other division during actual implementation.
- a plurality of units or components may be combined or integrated into another system, or some features may be ignored or not performed.
- the displayed or discussed mutual couplings or direct couplings or communication connections may be implemented through some interfaces.
- the indirect couplings or communication connections between the apparatuses or units may be implemented in an electrical form, a mechanical form, or another form.
- the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one location, or may be distributed on a plurality of network units. Some or all of the units may be selected based on actual requirements to achieve the objectives of the solutions of the embodiments.
- function units in embodiments of this application may be integrated into one processing unit, or each of the units may exist alone physically, or two or more units are integrated into one unit.
- the functions When the functions are implemented in a form of a software functional unit and sold or used as an independent product, the functions may be stored in a computer-readable storage medium. Based on such an understanding, the technical solutions of this application essentially, or the part contributing to the conventional technology, or some of the technical solutions may be implemented in a form of a software product.
- the computer software product is stored in a storage medium, and includes a plurality of instructions for instructing a computer device (which may be a personal computer, a server, a network device, or the like) to perform all or some of the steps of the methods described in embodiments of this application.
- the foregoing storage medium includes various media that can store program code, such as a USB flash drive, a removable hard disk, a read-only memory (Read-Only Memory, ROM), a random access memory (Random Access Memory, RAM), a magnetic disk, or an optical disc.
- program code such as a USB flash drive, a removable hard disk, a read-only memory (Read-Only Memory, ROM), a random access memory (Random Access Memory, RAM), a magnetic disk, or an optical disc.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Radar Systems Or Details Thereof (AREA)
Abstract
This application provides a communication system, method, and apparatus. The system is applied to implement AKMA service-based data transmission between a terminal device and an application function network element, and the system includes an AKMA anchor function network element and a network exposure function network element. The network exposure function network element obtains first identification information from a unified data management network element, where the first identification information is used to determine an authentication server function network element corresponding to the terminal device, and sends the first identification information to the AKMA anchor function network element. The AKMA anchor function network element obtains, from the unified data management network element based on the first identification information, identification information of the authentication server function network element corresponding to the terminal device.
Description
- This application is a continuation of International Application No. PCT/CN2021/084120, filed on Mar. 30, 2021, which claims priority to Chinese Patent Application No. 202010239015.9, filed on Mar. 30, 2020. The disclosures of the aforementioned applications are hereby incorporated by reference in their entireties.
- This application relates to the field of communication technologies, and in particular, to a communication system, method and apparatus.
- In a process in which a terminal device registers with a core network, when receiving a registration request from the terminal device, an access network device selects a mobility management network element, and forwards the registration request to the mobility management network element, where the registration request may carry identity information of the terminal device. When receiving the registration request from the access network device, the mobility management network element may select an authentication server function network element based on the identity information of the terminal device that is carried in the registration request. The authentication server function network element may determine, based on the identity information of the terminal device, a unified data management network element serving the terminal device.
- Currently, the terminal device may support an authentication and key management for applications (authentication and key management for applications, AKMA) service. In the AKMA service, the terminal device may perform data transmission with an application function network element not through the mobility management network element. In this way, the application function network element needs to learn of a communication key between the application function network element and the terminal device. The application function network element obtains the communication key between the application function network element and the terminal device from an AKMA anchor function network element, and the AKMA anchor function network element generates the communication key between the application function network element and the terminal device based on a key of the AKMA service of the terminal device and an identifier of the application function network element. The AKMA anchor function network element obtains the key of the AKMA service of the terminal device from the authentication server function network element corresponding to the terminal device, and the authentication server function network element corresponding to the terminal device stores an intermediate key generated in a primary authentication process. The authentication server function network element corresponding to the terminal device generates the key of the AKMA service of the terminal device based on the intermediate key.
- There are a plurality of authentication server function network elements in a network. How the AKMA anchor function network element determines the authentication server function network element corresponding to the terminal device is an urgent technical problem to be resolved.
- This application provides a communication system, method and apparatus, so that an AKMA anchor function network element can quickly and accurately determine an authentication server function network element corresponding to a terminal device.
- A first aspect of this application provides a communication system, where the system is configured to implement AKMA service-based data transmission between a terminal device and an application function network element, and the system includes an AKMA anchor function network element and a network exposure function network element, where the network exposure function network element is configured to: obtain first identification information from a unified data management network element, where the first identification information is used to determine an authentication server function network element corresponding to the terminal device, and send the first identification information to the AKMA anchor function network element; and the AKMA anchor function network element is configured to obtain, from the unified data management network element based on the first identification information, identification information of the authentication server function network element corresponding to the terminal device.
- The authentication server function network element corresponding to the terminal device is an authentication server function network element corresponding to an intermediate key of the terminal device, and stores the intermediate key generated by the authentication server function network element in a primary authentication process. The intermediate key is, for example, Kausf.
- According to the first aspect of this application, for the application function network element located outside a core network, the network exposure function network element obtains the first identification information from the unified data management network element, and sends the first identification information to the AKMA anchor function network element; and the AKMA anchor function network element obtains, from the unified data management network element based on the first identification information, the identification information of the authentication server function network element corresponding to the terminal device, so that the AKMA anchor function network element can quickly and accurately determine the authentication server function network element corresponding to the terminal device.
- In a possible implementation, that the first identification information is used to determine the authentication server function network element corresponding to the terminal device may be that the network exposure function network element determines the authentication server function network element corresponding to the terminal device in a direct determining manner or in an auxiliary determining manner, or may be that the AKMA anchor function network element determines the authentication server function network element corresponding to the terminal device in a direct determining manner or in an auxiliary determining manner. The direct determining manner means that additional information does not need to be obtained, and the determining is enabled directly based on the first identification information. This manner is easy to implement. The auxiliary determining manner means that additional information needs to be obtained, and the determining is performed with reference to the first identification information.
- In a possible implementation, the network exposure function network element is specifically configured to: receive second identification information from the application function network element; send a first request message to the unified data management network element when determining that the application function network element authorizes the network exposure function network element to request a key, where the first request message includes the second identification information, and requests the unified data management network element to determine the first identification information based on the second identification information; and receive a first response message from the unified data management network element, where the first response message includes the first identification information. Therefore, the network exposure function network element obtains the first identification information from the unified data management network element, so that a core network element obtains, from the unified data management network element based on the first identification information, the identification information of the authentication server function network element corresponding to the terminal device.
- In a possible implementation, the second identification information includes identification information of a key of the AKMA service, the identification information of the key of the AKMA service is unique, and the first identification information includes a subscriber permanent identifier SUPI of the terminal device.
- In a possible implementation, the second identification information includes identification information of a key of the AKMA service and temporary identity information of the terminal device, the identification information of the key of the AKMA service is not unique, and the first identification information includes an SUPI of the terminal device.
- In an implementation, the unified data management network element may determine intermediate information based on the identification information of the key of the AKMA service. The intermediate information may be, for example, the SUPI of the terminal device. To be specific, the unified data management network element determines the first identification information based on the second identification information, and sends the SUPI of the terminal device to the network exposure function network element, and the network exposure function network element may send the SUPI of the terminal device to the AKMA anchor function network element. The AKMA anchor function network element may obtain, from the unified data management network element by using the SUPI of the terminal device, the identification information of the authentication server function network element corresponding to the terminal device. This manner may be understood as the auxiliary determining manner.
- In an implementation, the unified data management network element may directly determine, based on the identification information of the key of the AKMA service, subscription data of the AKMA service and/or the identification information of the authentication server function network element corresponding to the terminal device. Further, the AKMA anchor function network element may obtain, from the unified data management network element, the identification information of the authentication server function network element corresponding to the terminal device. If only the subscription data of the AKMA service is determined, the subscription data of the AKMA service may include the identification information of the authentication server function network element corresponding to the terminal device. This manner may be understood as the direct determining manner.
- The key of the AKMA service may be Kakma, and the temporary identity information of the terminal device may be a subscription concealed identifier (subscriber concealed identifier, SUCI), a generic public subscription identifier (generic public subscription identifier, GPSI), or the like.
- In a possible implementation, the AKMA anchor function network element is specifically configured to: send a second request message to the unified data management network element, where the second request message includes the SUPI of the terminal device, and the second request requests the unified data management network element to determine, based on the SUPI of the terminal device, the identification information of the authentication server function network element corresponding to the terminal device; and receive a second response message from the unified data management network element, where the second response message includes the identification information of the authentication server function network element corresponding to the terminal device. Therefore, the AKMA anchor function network element obtains, from the unified data management network element, the identification information of the authentication server function network element corresponding to the terminal device, and then can quickly and accurately determine the authentication server function network element corresponding to the terminal device.
- In a possible implementation, the network exposure function network element is further configured to: receive an identifier of the application function network element; and send the identifier of the application function network element to the AKMA anchor function network element.
- The AKMA anchor function network element is further configured to: obtain, from the authentication server function network element corresponding to the terminal device, the key that is of the AKMA service and that is identified by identification information of the key of the AKMA service; generate a communication key between the application function network element and the terminal device based on the identifier of the application function network element and the key of the AKMA service; and send the communication key to the application function network element by using the network exposure function network element. Therefore, the application function network element may encrypt, by using the communication key, data to be sent to the terminal device, and this helps improve data transmission security.
- In a possible implementation, the AKMA anchor function network element is further configured to: perform authorization detection on the terminal device or the application function network element, and when completing the authorization detection, determine the authentication server function network element corresponding to the terminal device. Optionally, the AKMA anchor function network element is further configured to: perform authorization detection on the terminal device or the application function network element, and when completing the authorization detection, generate the communication key between the application function network element and the terminal device. The authorization detection can improve network security.
- A second aspect of this application provides a communication method, where the method is used to implement AKMA service-based data transmission between a terminal device and an application function network element, the method may be performed by an AKMA anchor function network element, or may be performed by a component (for example, a processor, a chip, or a chip system) of the AKMA anchor function network element, and the method may include:
- The AKMA anchor function network element receives first identification information from a network exposure function network element, where the first identification information is used to determine an authentication server function network element corresponding to the terminal device; and obtains, from a unified data management network element based on the first identification information, identification information of the authentication server function network element corresponding to the terminal device.
- The authentication server function network element corresponding to the terminal device is an authentication server function network element corresponding to an intermediate key of the terminal device, and stores the intermediate key generated by the authentication server function network element in a primary authentication process. The intermediate key is, for example, Kausf.
- According to the second aspect of this application, the AKMA anchor function network element obtains, from the unified data management network element based on the first identification information, the identification information of the authentication server function network element corresponding to the terminal device, so that the AKMA anchor function network element can quickly and accurately determine the authentication server function network element corresponding to the terminal device.
- In a possible implementation, the first identification information includes an SUPI of the terminal device.
- The AKMA anchor function network element sends a second request message to the unified data management network element, where the second request message includes the SUPI of the terminal device, and the second request requests the unified data management network element to determine, based on the SUPI of the terminal device, the identification information of the authentication server function network element corresponding to the terminal device; and receives a second response message from the unified data management network element, where the second response message includes the identification information of the authentication server function network element corresponding to the terminal device. Therefore, the AKMA anchor function network element obtains, from the unified data management network element, the identification information of the authentication server function network element corresponding to the terminal device, and then can quickly and accurately determine the authentication server function network element corresponding to the terminal device.
- In a possible implementation, the second response message further includes subscription data of the AKMA service of the terminal device. The AKMA anchor function network element may perform authorization detection on the terminal device or the application function network element based on the subscription data of the AKMA service of the terminal device, so that network security can be improved.
- In a possible implementation, the AKMA anchor function network element receives an identifier of the application function network element from the network exposure function network element; obtains, from the authentication server function network element corresponding to the terminal device, the key that is of the AKMA service and that is identified by identification information of the key of the AKMA service; generates a communication key between the application function network element and the terminal device based on the identifier of the application function network element and the key of the AKMA service; and sends the communication key to the application function network element by using the network exposure function network element. Therefore, the application function network element may encrypt, by using the communication key, data to be sent to the terminal device, and this helps improve data transmission security.
- In a possible implementation, the AKMA anchor function network element performs authorization detection on the terminal device or the application function network element, and when completing the authorization detection, determines the authentication server function network element corresponding to the terminal device. Optionally, the AKMA anchor function network element is further configured to: perform authorization detection on the terminal device or the application function network element, and when completing the authorization detection, generate the communication key between the application function network element and the terminal device. The authorization detection can improve network security.
- A third aspect of this application provides a communication method, where the method is used to implement AKMA service-based data transmission between a terminal device and an application function network element, the method may be performed by a network exposure function network element, or may be performed by a component (for example, a processor, a chip, or a chip system) of the network exposure function network element, and the method may include:
- The network exposure function network element obtains first identification information from a unified data management network element, where the first identification information is used to determine an authentication server function network element corresponding to the terminal device, and sends the first identification information to an AKMA anchor function network element.
- The authentication server function network element corresponding to the terminal device is an authentication server function network element corresponding to an intermediate key of the terminal device, and stores the intermediate key generated by the authentication server function network element in a primary authentication process. The intermediate key is, for example, Kausf.
- According to the third aspect of this application, the network exposure function network element obtains the first identification information, and sends the first identification information to the AKMA anchor function network element; so that the AKMA anchor function network element obtains, from the unified data management network element based on the first identification information, the identification information of the authentication server function network element corresponding to the terminal device, so that the AKMA anchor function network element can quickly and accurately determine the authentication server function network element corresponding to the terminal device.
- In a possible implementation, the network exposure function network element receives second identification information from the application function network element; sends a first request message to the unified data management network element when determining that the application function network element authorizes the network exposure function network element to request a key, where the first request message includes the second identification information, and requests the unified data management network element to determine the first identification information based on the second identification information; and receives a first response message from the unified data management network element, where the first response message includes the first identification information. Therefore, the network exposure function network element obtains the first identification information from the unified data management network element, so that a core network element obtains, from the unified data management network element based on the first identification information, the authentication server function network element corresponding to the terminal device.
- In a possible implementation, the second identification information includes identification information of a key of the AKMA service, the identification information of the key of the AKMA service is unique, and the first identification information includes an SUPI of the terminal device.
- In a possible implementation, the second identification information includes identification information of a key of the AKMA service and temporary identity information of the terminal device, the identification information of the key of the AKMA service is not unique, and the first identification information includes an SUPI of the terminal device.
- In a possible implementation, the network exposure function network element receives the identifier of the application function network element, and sends the identifier of the application function network element to the AKMA anchor function network element, so that when the AKMA anchor function network element obtains the key of the AKMA service from the authentication server function network element corresponding to the terminal device, generates a communication key between the application function network element and the terminal device.
- A fourth aspect of this application provides a communication system, where the system is configured to implement AKMA service-based data transmission between a terminal device and an application function network element, and the system includes an AKMA anchor function network element and a network exposure function network element.
- The network exposure function network element is configured to: obtain first identification information from a unified data management network element, where the first identification information is used to determine an authentication server function network element corresponding to the terminal device; obtain, from the unified data management network element based on the first identification information, identification information of the authentication server function network element corresponding to the terminal device; and send the first identification information of the authentication server function network element corresponding to the terminal device to the AKMA anchor function network element.
- The AKMA anchor function network element is configured to receive the identification information of the authentication server function network element corresponding to the terminal device from the network exposure function network element.
- The authentication server function network element corresponding to the terminal device is an authentication server function network element corresponding to an intermediate key of the terminal device, and stores the intermediate key generated by the authentication server function network element in a primary authentication process. The intermediate key is, for example, Kausf.
- According to the fourth aspect of this application, for an application function network element located outside a core network, the network exposure function network element obtains the identification information of the authentication server function network element corresponding to the terminal device from the unified data management network element and sends the identification information of the authentication server function network element corresponding to the terminal device to the AKMA anchor function network element, so that the AKMA anchor function network element can quickly and accurately determine the authentication server function network element corresponding to the terminal device.
- In a possible implementation, the network exposure function network element is configured to: receive second identification information from the application function network element; send a first request message to the unified data management network element when determining that the application function network element authorizes the network exposure function network element to request a key, where the first request message includes the second identification information, and requests the unified data management network element to determine the first identification information based on the second identification information; and receive a first response message from the unified data management network element, where the first response message includes the first identification information. Therefore, the network exposure function network element obtains the first identification information from the unified data management network element, to obtain, from the unified data management network element based on the first identification information, the identification information of the authentication server function network element corresponding to the terminal device.
- In a possible implementation, the network exposure function network element is configured to: send a first request message to the unified data management network element, where the first request message includes the second identification information, and requests the unified data management network element to determine, based on the second identification information, the identification information of the authentication server function network element corresponding to the terminal device; and receive a first response message from the unified data management network element, where the first response message includes the identification information of the authentication server function network element corresponding to the terminal device. Therefore, the network exposure function network element directly obtains, from the unified data management network element, the identification information of the authentication server function network element corresponding to the terminal device.
- In a possible implementation, the second identification information includes identification information of a key of the AKMA service, the identification information of the key of the AKMA service is unique, and the first identification information includes an SUPI of the terminal device.
- In a possible implementation, the second identification information includes identification information of a key of the AKMA service and temporary identity information of the terminal device, the identification information of the key of the AKMA service is not unique, and the first identification information includes an SUPI of the terminal device.
- A fifth aspect of this application provides a communication method, where the method is used to implement AKMA service-based data transmission between a terminal device and an application function network element, the method may be performed by an AKMA anchor function network element, or may be performed by a component (for example, a processor, a chip, or a chip system) of the AKMA anchor function network element, and the method may include:
- The AKMA anchor function network element is configured to receive identification information of an authentication server function network element corresponding to the terminal device from a network exposure function network element; and determine, based on the identification information of the authentication server function network element corresponding to the terminal device, the authentication server function network element corresponding to the terminal device.
- According to the fifth aspect of this application, the AKMA anchor function network element directly obtains, from the network exposure function network element, the identification information of the authentication server function network element corresponding to the terminal device, so that the AKMA anchor function network element can quickly and accurately determine the authentication server function network element corresponding to the terminal device.
- A sixth aspect of this application provides a communication method, where the method is used to implement AKMA service-based data transmission between a terminal device and an application function network element, the method may be performed by a network exposure function network element, or may be performed by a component (for example, a processor, a chip, or a chip system) of the network exposure function network element, and the method may include:
- The network exposure function network element is configured to obtain, from the unified data management network element, identification information of an authentication server function network element corresponding to the terminal device; and send the identification information of the authentication server function network element corresponding to the terminal device to an AKMA anchor function network element.
- According to the sixth aspect of this application, the network exposure function network element obtains, from the unified data management network element, the identification information of the authentication server function network element corresponding to the terminal device, and notifies the AKMA anchor function network element, so that the AKMA anchor function network element can quickly and accurately determine the authentication server function network element corresponding to the terminal device.
- In a possible implementation, the network exposure function network element obtains first identification information from a unified data management network element, where the first identification information is used to determine an authentication server function network element corresponding to the terminal device; obtains, from the unified data management network element based on the first identification information, identification information of the authentication server function network element corresponding to the terminal device; and sends the identification information of the authentication server function network element corresponding to the terminal device to the AKMA anchor function network element.
- In a possible implementation, the network exposure function network element is configured to: send a first request message to the unified data management network element, where the first request message includes second identification information, and requests the unified data management network element to determine, based on the second identification information, the identification information of the authentication server function network element corresponding to the terminal device; and receive a first response message from the unified data management network element, where the first response message includes the identification information of the authentication server function network element corresponding to the terminal device.
- A seventh aspect of this application provides a communication system, where the system is configured to implement AKMA service-based data transmission between a terminal device and an application function network element, and the system includes an AKMA anchor function network element and a network exposure function network element.
- The network exposure function network element is configured to receive a key request message from the application function network element, and send the key request message to the AKMA anchor function network element, where the key request message includes second identification information.
- The AKMA anchor function network element is configured to obtain, from a unified data management network element based on the second identification information, identification information of an authentication server function network element corresponding to the terminal device.
- The authentication server function network element corresponding to the terminal device is an authentication server function network element corresponding to an intermediate key of the terminal device, and stores the intermediate key generated by the authentication server function network element in a primary authentication process. The intermediate key is, for example, Kausf.
- According to the seventh aspect of this application, for an application function network element located outside a core network, the network exposure function network element directly forwards, to the AKMA anchor function network element, the key request message sent by the application function network element; and the AKMA anchor function network element autonomously obtains, from the unified data management network element based on the second identification information, the identification information of the authentication server function network element corresponding to the terminal device, so that the AKMA anchor function network element can quickly and accurately determine the authentication server function network element corresponding to the terminal device.
- In a possible implementation, the second identification information includes identification information of a key of the AKMA service, and the identification information of the key of the AKMA service is unique.
- In a possible implementation, the second identification information includes identification information of a key of the AKMA service and temporary identity information of the terminal device, and the identification information of the key of the AKMA service is not unique.
- An eighth aspect of an embodiment of this application provides a communication apparatus. The communication apparatus may be an AKMA anchor function network element, or may be a component of the AKMA anchor function network element, or an apparatus that can match and be used with the AKMA anchor function network element. In a design, the apparatus may include modules that are in correspondence with the methods/operations/steps/actions described in the second aspect or the fifth aspect. The modules may be implemented by using a hardware circuit, software, or a combination of the hardware circuit and the software. In a design, the apparatus may include a processing module and a transceiver module. For example, the processing module is configured to: receive, by using the transceiver module, first identification information from a network exposure function network element, where the first identification information is used to determine an authentication server function network element corresponding to a terminal device; and obtain, from a unified data management network element based on the first identification information, identification information of the authentication server function network element corresponding to the terminal device.
- A ninth aspect of an embodiment of this application provides a communication apparatus. The apparatus includes a processor, configured to implement the method described in the second aspect. The apparatus may further include a memory, configured to store instructions and data. The memory is coupled to the processor. When the processor executes the instructions stored in the memory, the apparatus may be enabled to implement the method described in the second aspect or the method described in the fifth aspect. The apparatus may further include a communication interface. The communication interface is used by the apparatus to communicate with another device. For example, the communication interface may be a transceiver, a circuit, a bus, a module, or another type of communication interface. The another device may be a unified data management network element, a network exposure function network element or the like. In a possible design, the apparatus includes:
- the memory, configured to store program instructions; and
- the processor is configured to control the communication interface to: receive first identification information from the network exposure function network element, where the first identification information is used to determine an authentication server function network element corresponding to a terminal device; and obtain, from the unified data management network element based on the first identification information, identification information of the authentication server function network element corresponding to the terminal device.
- A tenth aspect of an embodiment of this application provides a computer-readable storage medium, including instructions. When the instructions are run on a computer, the computer is enabled to perform the method provided in the second aspect or the method in the fifth aspect.
- An eleventh aspect of an embodiment of this application provides a chip system. The chip system includes a processor, and may further include a memory, configured to implement the method provided in the second aspect or the method in the fifth aspect. The chip system may include a chip, or may include a chip and another discrete component.
- A twelfth aspect of an embodiment of this application provides a communication apparatus. The communication apparatus may be a network exposure function network element, or may be a component of the network exposure function network element, or an apparatus that can match and be used with the network exposure function network element. In a design, the apparatus may include modules that are in correspondence with the methods/operations/steps/actions described in the third aspect or the sixth aspect. The modules may be implemented by using a hardware circuit, software, or a combination of the hardware circuit and the software. In a design, the apparatus may include a processing module and a transceiver module. For example, the processing module is configured to: obtain, by using the transceiver module, first identification information from a unified data management network element, where the first identification information is used to determine an authentication server function network element corresponding to a terminal device, and send the first identification information to an AKMA anchor function network element.
- A thirteenth aspect of an embodiment of this application provides a communication apparatus. The apparatus includes a processor, configured to implement the method described in the third aspect. The apparatus may further include a memory, configured to store instructions and data. The memory is coupled to the processor. When the processor executes the instructions stored in the memory, the apparatus may be enabled to implement the method described in the third aspect or the method described in the sixth aspect. The apparatus may further include a communication interface. The communication interface is used by the apparatus to communicate with another device. For example, the communication interface may be a transceiver, a circuit, a bus, a module, or another type of communication interface. The another device may be a unified data management network element, a network exposure function network element or the like. In a possible design, the apparatus includes:
- the memory, configured to store program instructions; and
- the processor is configured to control the communication interface to: obtain first identification information from the unified data management network element, where the first identification information is used to determine an authentication server function network element corresponding to a terminal device, and send the first identification information to an AKMA anchor function network element.
- A fourteenth aspect of an embodiment of this application provides a computer-readable storage medium, including instructions. When the instructions are run on a computer, the computer is enabled to perform the method provided in the third aspect or in the sixth aspect.
- A fifteenth aspect of an embodiment of this application provides a chip system. The chip system includes a processor, and may further include a memory, configured to implement the method provided in the third aspect or in the sixth aspect. The chip system may include a chip, or may include a chip and another discrete component.
-
FIG. 1 is a schematic diagram of a network architecture of a 5G communication system; -
FIG. 2 is a schematic diagram of a network architecture of an AKMA service; -
FIG. 3 is a schematic flowchart of generating a key of an AKMA service; -
FIG. 4 is a schematic flowchart of generating a communication key between an AF and UE; -
FIG. 5 is a schematic diagram of a network architecture according to this application; -
FIG. 6A andFIG. 6B are a schematic flowchart of a communication method according to this application; -
FIG. 7 is a schematic flowchart beforestep 601 inFIG. 6A andFIG. 6B ; -
FIG. 8A andFIG. 8B are a schematic flowchart of another communication method according to this application; -
FIG. 9 is a schematic flowchart of still another communication method according to this application; -
FIG. 10 is a schematic diagram of a structure of a communication apparatus according to this application; and -
FIG. 11 is a schematic diagram of a structure of another communication apparatus according to this application. - To better understand the technical solutions provided in this application, technical terms in this application are first described.
- (1) FIFTH-GENERATION (5TH-GENERATION, 5G) SYSTEM
- The 5G system may include a terminal device, an access network, and a core network. For example, refer to a schematic diagram of a network architecture of a 5G system shown in
FIG. 1 . - The terminal device is a device that has a wireless transceiver function, and may be deployed on the land, including an indoor or outdoor device, a hand-held device, a wearable device, or a vehicle-mounted device, or may be deployed on the water (for example, on a ship), or may be deployed in the air (for example, on a plane, a balloon, or a satellite). The terminal device may be a mobile phone (mobile phone), a tablet computer (pad), a computer having a wireless transceiver function, a virtual reality (virtual reality, VR) terminal device, an augmented reality (augmented reality, AR) terminal device, a wireless terminal in industrial control (industrial control), a vehicle-mounted terminal device, a wireless terminal in self-driving (self-driving), a wireless terminal in telemedicine (remote medical), a wireless terminal in a smart grid (smart grid), a wireless terminal in transportation safety (transportation safety), a wireless terminal in a smart city (smart city), a wireless terminal in a smart home (smart home), a wearable terminal device, or the like. The terminal device sometimes may also be referred to as a terminal, user equipment (user equipment, UE), an access terminal device, a vehicle-mounted terminal, an industrial control terminal, a UE unit, a UE station, a mobile station, a mobile console, a remote station, a remote terminal device, a mobile device, a UE agent, a UE apparatus, or the like. The terminal device may alternatively be fixed or mobile. In
FIG. 1 and this application, an example in which the terminal device is UE is used for description. - An access network is configured to implement an access-related function, and may provide a network access function for an authorized user in a specific area. The access network forwards a control signal and user data between the terminal device and a core network. The access network may include an access network device. The access network device may be a device that provides access for the terminal device, and may include a radio access network (radio access network, RAN) device and an device. The RAN device is mainly a wireless network device in a 3GPP network, and the AN device may be an access network device defined in non-3GPP. In a system using different radio access technologies, a device having a base station function may have different names. For example, in a 5G system, the device is referred to as a RAN or a next generation base station (next-generation Node basestation, gNB). In a long term evolution (long term evolution, LTE) system, the device is referred to as an evolved NodeB (evolved NodeB, eNB or eNodeB).
- The core network is responsible for maintaining subscription data of a mobile network, and providing functions such as session management, mobility management, policy management, and security authentication for the UE. The core network may include the following network elements: a user plane function (user plane function, UPF) network element, an authentication service function (authentication server function, AUSF) network element, an access and mobility management function (access and mobility management function, AMF) network element, a session management function (session management function, SMF) network element, a network exposure function (network exposure function, NEF) network element, a network repository function (network function repository function, NRF) network element, a policy control function (policy control function, PCF) network element, a unified data management (unified data management, UDM) network element, and an application function (application function, AF) network element.
- The AMF is mainly responsible for mobility management in the mobile network, such as user location update, registration of a user with a network, and user switching. The SMF is mainly responsible for session management in the mobile network, such as session establishment, modification, and release. The UPF is responsible for forwarding and receiving user data in the terminal device, may receive the user data from a data network, and transmit the user data to the terminal device by using the access network device; or may receive the user data from the terminal device by using the access network device, and forward the user data to the data network. The PCF mainly supports providing a unified policy framework to control network behavior, and providing a policy rule for a control layer network function, and is responsible for obtaining policy-decision-related subscription information of a user. The AUSF is configured to perform UE security authentication. The NEF is mainly configured to support capability and event exposure. The NRF is configured for storing and selecting network function entity information for another network element. The UDM is configured to store user data, for example, subscription data and authentication/authorization data. The AF interacts with a 3GPP core network to provide an application layer service, for example, provide application layer data routing, provide an access network capability exposure function, interact with a policy framework to provide policy control, and interact with an IP multimedia subsystem (IP multimedia subsystem, IMS) in a 5G network.
- The data network (data network, DN) is configured to provide services for users. The data network may be a private network, for example, a local area network. The data network may alternatively be an external network that is not controlled by operators, for example, the Internet (Internet). The data network may alternatively be a dedicated network jointly deployed by operators, for example, a network in the IMS. The terminal device may access the DN by using an established protocol data unit (protocol data unit, PDU) session.
- (2) AKMA Service
- When UE that supports the AKMA service performs data transmission with an AF that supports the AKMA service, security protection based on an AKMA procedure can be performed to improve data transmission security. For example, the AF corresponds to a video application program. When the UE that supports the AKMA service performs data transmission with the AF, in comparison with a conventional unprotected transmission method between the UE and the AF, using the AKMA service can improve data transmission security. For example, refer to a schematic diagram of a network architecture of an AKMA service shown in
FIG. 2 . The network architecture shown inFIG. 2 includes UE, a (R)AN, an AUSF, an AMF, an AF, an NEF, an AKMA anchor function network element (AKMA anchor function, AAnF), and a UDM. - In
FIG. 2 , there are three manners in which the UE communicates with the AF. One manner is that the UE communicates with the AF by using the (R)AN and the AMF, one manner is that the UE communicates with the AF by using the AMF, and one manner is that the UE directly communicates with the AF through a Ua* interface. The Ua* interface is a communication interface between the UE and the AF. - In
FIG. 2 , in the AKMA service, the AUSF may generate a key of the AKMA service, and provide the key of the AKMA service of the UE to the AAnF. The key of the AKMA service may be Kakma, or may be referred to as a root key of the AKMA service. A UE side also generates a same key of the AKMA service, that is, same Kakma. - For example, for a process of generating the key of the AKMA service, refer to
FIG. 3 . When UE registers with a 5G core network, the UE sends a registration request to an AMF through a RAN. The registration request carries identity information of the UE. The AMF selects an AUSF based on the identity information of the UE (for example, a subscription concealed identifier (subscriber concealed identifier, SUCI)), and sends a message to the AUSF to trigger a primary authentication procedure. The AUSF authenticates the UE and sends an authentication parameter to the AMF. The AMF sends the authentication parameter to the UE through the RAN. The UE authenticates the AUSF based on the authentication parameter and sends a response to the AMF through the RAN. The AMF compares the response. If the response meets a requirement, the authentication succeeds. Primary authentication (primary authentication) inFIG. 3 is a process in which the AUSF authenticates the UE and the UE authenticates the AUSF in a registration process. The primary authentication may also be described as bidirectional authentication. InFIG. 3 , after the primary authentication, the AUSF may generate Kakma by using an intermediate key generated in a primary authentication process, for example, Kausf, and generate key identifier information for Kakma. The key identifier information may be used to identify Kakma, for example, may be a Kakma identifier (identifier, ID). After the primary authentication and before initiating an AKMA service, the UE generates Kakma by using an intermediate key generated in a primary authentication process, for example, Kausf, and generates key identifier information for Kakma. - In
FIG. 2 , the AAnF may interact with the AUSF, obtain the key of the AKMA service from the AUSF, and generate a communication key between the AF and the UE and a validity period of the communication key based on the key of the AKMA service and an identifier of the AF. The AAnF may send the communication key and the validity period of the communication key to the AF, so that the AF can perform data transmission with the UE by using the communication key, and this improves data transmission security between the AF and the UE. The communication key between the AF and the UE may be, for example, Kaf. - For example, for a process of generating the communication key between the AF and the UE, refer to
FIG. 4 . InFIG. 4 , before sending an application session establishment request to the AF, the UE performs a process of primary authentication and Kakma generation. After Kakma and the Kakma ID are generated, the AAnF may store Kakma corresponding to the Kakma ID. The UE sends, to the AF, an application session establishment request (for example, an application session establishment request) that carries the Kakma ID. When receiving the application session establishment request, the AF sends a key request (for example, a key request) to the AAnF, where the key request requests Kaf between the AF and the UE, and the key request carries the Kakma ID and an AF ID. If the AAnF stores Kakma corresponding to the Kakma ID, the AAnF directly generates Kaf and a validity period of Kaf based on Kakma and the AF ID. If the AAnF does not store Kakma corresponding to the Kakma ID, the AAnF sends an AKMA key request (for example, an AKMA key request) carrying the Kakma ID to the AUSF. The AUSF searches for corresponding Kakma based on the Kakma ID, and sends an AKMA key response carrying Kakma to the AAnF. The AAnF generates Kaf and the validity period of Kaf based on Kakma and the AF ID. The AAnF sends a key response (for example, a key response) to the AF, where the key response carries Kaf and the validity period of Kaf. After receiving the key response, the AF sends an application session establishment response (for example, an application session establishment response) to the UE. - Kaf between different AFs and same UE may be different. For example, Kaf between an AF 1 and UE 1 is Kaf 1, and Kaf between an AF 2 and the UE 1 is Kaf 2. In
FIG. 2 , the AF may interact with a 3GPP core network element. For example, the AF may obtain a quality of service (quality of service, QoS) parameter from a PCF, or the AF provides a QoS parameter for a PCF, and then data transmission of an application program may be affected. For another example, the AF may interact with an NEF. In an AKMA service scenario, the AF obtains, from the AAnF, the communication key between the AF and the UE and the validity period of the communication key. The AF may be located inside or outside the 5G core network. If the AF is located inside the 5G core network, the AF may directly interact with the PCF. If the AF is located outside the 5G core network, the AF may interact with the PCF by using the NEF. - In
FIG. 2 , the NEF may be used as an intermediate medium to provide an interaction service between an AF located outside the 5G core network and an AAnF in the 5G core network, and may further provide an interaction service between an AF located outside the 5G core network and a PCF in the 5G core network. - The 5G system includes one AUSF. When the AUSF stores Kausf, the AUSF may generate Kakma based on Kausf, and the AAnF may obtain Kakma from the AUSF, to generate Kaf between the AF and the UE. However, in actual application, the 5G system may include a plurality of AUSFs, and how the AAnF determines an AUSF that stores Kausf is an urgent technical problem to be resolved.
- In view of this, this application provides a communication system, method and apparatus, so that the AAnF can quickly and accurately determine the AUSF that stores Kausf.
-
FIG. 5 is a schematic diagram of a network architecture according to this application. The network architecture shown inFIG. 5 is used to implement AKMA service-based data transmission between a terminal device and an application function network element. - In an implementation, the network architecture shown in
FIG. 5 may include aterminal device 101, an authentication server function network element 102, a unified datamanagement network element 103, an AKMA anchor function network element 104, a network exposurefunction network element 105, and an application function network element 106. In this implementation, the application function network element is located outside a core network, and communicates with a core network element by using the network exposure function network element. In this implementation, the network exposure function network element may also be referred to as an AKMA interworking function (interworking function) network element. - In an implementation, the network architecture shown in
FIG. 5 may include aterminal device 101, an authentication server function network element 102, a unified datamanagement network element 103, an AKMA anchor function network element 104, and an application function network element 106. In this implementation, the application function network element is located inside a core network, and may directly communicate with a core network element. - This application is described by using an example in which the application function network element is located outside the core network. For a case in which the application function network element is located inside the core network, an interaction procedure between the application function network element and the network exposure function network element in this application may be omitted.
- It should be noted that a quantity of network elements in
FIG. 5 is used as an example, and does not constitute a limitation on this embodiment of this application. For example, in actual application, a plurality of terminal devices, authentication server function network elements, application function network elements, and the like may be included. - In
FIG. 5 , for descriptions of theterminal device 101, refer to specific descriptions of the terminal device in the foregoing 5G system. The authentication server function network element 102 may be an AUSF in a 5G core network, or may be a network element configured to implement a function of an AUSF in a future communication system. The unified datamanagement network element 103 may be a UDM in a 5G core network, or may be a network element configured to implement a function of a UDM in a future communication system. The AKMA anchor function network element 104 may be the AAnF inFIG. 2 , or may be a network element configured to implement a function of an AAnF in a future communication system. The network exposurefunction network element 105 may be an NEF in a 5G core network, or may be a network element configured to implement a function of an NEF in a future communication system. The application function network element 106 may be an AF in the 5G system, or may be a network element configured to implement a function of an AF in a future communication system. In this application, an example in which theterminal device 101 is the UE, the authentication server function network element 102 is the AUSF, the unified datamanagement network element 103 is the UDM, the AKMA anchor function network element 104 is the AAnF, the network exposurefunction network element 105 is the NEF, and the application function network element 106 is the AF is used for description. - In a possible implementation, the NEF obtains first identification information from the UDM, and sends the first identification information to the AAnF, where the first identification information is used by the NEF or the AAnF to determine an AUSF corresponding to Kausf that stores related UE in a direct determining manner or in an auxiliary determining manner. The AUSF corresponding to Kausf of the UE may also be described as an AUSF corresponding to the UE. The direct determining manner means that the NEF or the AAnF may directly determine, by using the first identification information, the AUSF that stores Kausf, to be specific, the AUSF that stores Kausf may be determined without using the first identification information to obtain additional information. The auxiliary determining manner means that after receiving the first identification information, the NEF or the AAnF further needs to obtain additional information to determine the AUSF that stores Kausf.
- For example, a method for directly determining the AUSF corresponding to Kausf of the UE may be: The first identification information is or includes identification information of the AUSF, for example, an AUSF ID. The identification information of the AUSF is information in which an AUSF corresponding to Kausf of the UE generates Kausf in a primary authentication process and stores the AUSF of Kausf. The information may be stored by the UDM. Function entities such as the AMF, the SMF, the NEF, and the AAnF may determine a unique AUSF based on the identification information of the AUSF. In this application, the AUSF is an AUSF that generates Kausf and stores Kausf in a primary authentication process for the AUSF corresponding to Kausf of the UE. For another example, an auxiliary determining method may be as follows: When receiving the first identification information, the AAnF obtains, from the UDM based on the first identification information, the identification information of the AUSF corresponding to Kausf of the UE, for example, an AUSF instance ID (AUSF instance identifier, AUSF ID). The AUSF corresponding to Kausf of the UE generates Kausf and stores Kausf in the primary authentication process, so that the AAnF can quickly and accurately determine the AUSF that stores Kausf.
- In a possible implementation, the NEF obtains the first identification information from the UDM, and sends the first identification information to the AAnF, where the first identification information is used by the NEF or the AAnF to determine an AUSF corresponding to Kausf that stores Kausf of related UE in a direct determining manner or in an auxiliary determining manner. The direct determining manner means that the NEF or the AAnF may directly determine, by using the first identification information, the AUSF that stores Kausf, to be specific, the AUSF that stores Kausf may be determined without using the first identification information to obtain additional information. The auxiliary determining manner means that after receiving the first identification information, the NEF or the AAnF further needs to obtain additional information to determine the AUSF that stores Kausf. For example, after the NEF obtains the first identification information, the NEF obtains, from the UDM based on the first identification information, the identification information of the AUSF corresponding to Kausf that stores the related UE, for example, the AUSF ID. The NEF sends, to the AAnF, the identification information of the AUSF corresponding to Kausf that stores the related UE. The AAnF receives the identification information of the AUSF from the NEF. The AUSF corresponding to Kausf of the UE generates Kausf and stores Kausf in the primary authentication process, so that the AAnF can quickly and accurately determine the AUSF that stores Kausf.
- In a possible implementation, the NEF receives a key request message from the AF, and sends the key request message to the AAnF, where the key request message includes second identification information. The AAnF obtains, from the UDM based on the second identification information, the identification information of the AUSF corresponding to Kausf of the UE. The AUSF corresponding to Kausf of the UE generates Kausf and stores Kausf in the primary authentication process. Therefore, the AAnF can accurately determine the AUSF that stores Kausf.
- When the AAnF accurately determines the AUSF that stores Kausf, the AAnF obtains Kakma from the AUSF, may generate Kaf between the UE and the AF and a validity period of Kaf based on Kakma and the AF ID, and sends Kaf and the validity period of Kaf to the AF, so that the AF performs data transmission with the UE by using Kaf, and this improves data transmission security.
- The following describes the communication method provided in this application with reference to the network architecture shown in
FIG. 5 . -
FIG. 6A andFIG. 6B are a schematic flowchart of a communication method according to an embodiment of this application. The flowchart may include but is not limited to the following steps. - Step 601: UE sends an application session establishment request message to an AF. Correspondingly, the AF receives the application session establishment request message from the UE.
- The application session establishment request message may be, for example, an application session establishment request message, and is used to trigger establishment of a connection between the UE and the AF. The connection may be used for AKMA service-based data transmission between the UE and the AF. The application session establishment request message may include second identification information.
- In an implementation, the second identification information includes a Kakma ID, and the Kakma ID is unique. The Kakma ID that is unique may be used as routing information for searching for an AUSF corresponding to Kausf of the UE. The routing information of the AUSF refers to an initial condition that may be used for searching for and storing identification information of an AUSF corresponding to Kausf of related UE. A UDM, an NEF, or an AAnF may use the routing information of the AUSF as reference content to search for and finally obtain and store the identification information of the AUSF corresponding to Kausf of the related UE. A search process may be direct or indirect. A direct search process means that the identification information, for example, an AUSF ID, of the AUSF corresponding to Kausf of the related UE may be directly determined and stored based on the routing information of the AUSF. For example, the UDM directly determines subscription data of an AKMA service of the UE and/or the identification information of the AUSF based on the Kakma ID, and may further determine the AUSF corresponding to Kausf of the UE. If there is only the subscription data of the AKMA service, it means that the identification information of the AUSF and the subscription data of the AKMA service are stored together. For another example, the UDM may directly determine, based on the Kakma ID, the identification information of the AUSF corresponding to Kausf of the UE. An indirect search process means that intermediate information needs to be first found by using the routing information of the AUSF, and then basic information that stores the identification information of the AUSF corresponding to Kausf of the related UE is finally obtained based on the intermediate information. There may be one or more pieces of intermediate information, and a specific quantity is not limited in the present invention. For example, the UDM may determine an SUPI of the UE based on the Kakma ID, and may determine, based on the SUPI of the UE, the identification information of the AUSF corresponding to Kausf of the UE. In this case, the Kakma ID is used as an initial condition of the routing information of the AUSF to obtain the intermediate information SUPI of the UE, and the intermediate information SUPI of the UE may be used by the UDM to search for the subscription data of the AKMA service of the UE and/or the identification information of the AUSF. Further, the AUSF corresponding to Kausf of the UE may be determined. If there is only the subscription data of the AKMA service, it means that the identification information of the AUSF and the subscription data of the AKMA service are stored together. For another example, the UDM may directly determine, based on the Kakma ID, the identification information of the AUSF corresponding to Kausf of the UE.
- The Kakma ID that is unique means that the Kakma ID can uniquely identify Kakma and uniquely find UE. A format of the Kakma ID may be a format that can be used as address information. Being used as the address information may be understood as a form similar to an email, that is, user name@address. For example, the format of the Kakma ID may be a network access identifier (network access identifier, NAI) format, and the NAI format is specifically represented as value@3GPP network information. A value part is a key to reflect uniqueness of the Kakma ID, and a 3GPP network information part may be the same for each Kakma ID of one UE. The value part of the Kakma ID may have a plurality of forms, and a specific form may include at least one of a generated value, a fixed value, and a stable variation value. The generated value indicates that the kakma ID needs to be generated each time. The fixed value is a value that remains unchanged each time and has a special meaning. The stable variation value may be a counter that grows stably. A method for generating a value may be: generated value=KDF(key, parameter 1, parameter 2). The KDF is a key derived function. In a current technology, the KDF is used by the UE and the AUSF to generate a key Kseaf. The KDF is essentially a hash function, and is used as a key derivation algorithm in 3GPP. The key herein may be Kausf, or may be Kakma, or may be an intermediate key or a part of the intermediate key generated by using an authentication method other than 5G-authentication and key management (5G-authentication and key management, 5G-AKA) and enhanced EAP authentication and key agreement (EAP authentication and key agreement, EAP-AKA′). For example, an extended master session key (extended master session key, EMSK) or a part of the EMSK, or a master session key (MSK) or a part of the MSK is generated for an authentication process such as extensible authentication protocol transport layer security (extensible authentication protocol transport layer security, EAP-TLS). The parameter 1 may indicate a purpose, for example, may be a character string “AKMA”, or may be an “AKMA ID”. The parameter 1 may alternatively indicate application (application, APP) information, for example, a character string “APP ID”. The parameter 2 may be a fresh parameter, for example, a user identity SUPI, or a counter that is automatically increased by 1 when each time being used. Only one of the parameter 1 and the parameter 2 may be required. For example, generated value=KDF(key, parameter 1), or generated value=KDF(key, parameter 2). In addition, there may be two or more sub-parameters 1 and two or more sub-parameters 2. For example, generated value=KDF(key, sub-parameter 1, sub-parameter 1, parameter 2), or KDF(key, sub-parameter 1, sub-parameter 2, sub-parameter 2), or KDF(key, sub-parameter 1, sub-parameter 1), or KDF(key, sub-parameter 2, sub-parameter 2). It should be noted that the formula “generated value=KDF(key, parameter 1, parameter 2)” does not pose a limitation that an input parameter of the KDF is not allowed to include another parameter, in other words, the input parameter of the KDF may further include another parameter. For example, in a 3GPP key generation process, an FC value is used. Input parameters traditionally used by 3GPP in key generation, such as the FC value, are not listed one by one herein. It should be further noted that an input sequence of the parameter 1 and the parameter 2 is not limited in the present invention.
- After the AUSF generates the Kakma ID, the AUSF may send the Kakma ID to the UDM, and the UDM stores the Kakma ID. The AUSF may send the Kakma ID by using a service—oriented message, for example, a UDM authentication result confirmation request message (Nudm_UEAuthentication_ResultConfirmation Request), or may send the Kakma ID by using a newly defined service—oriented message, for example, a Nudm_UEAKMA_InformationUpdate Request message. After receiving the Kakma ID, the UDM stores the value.
- In an implementation, the second identification information includes the Kakma ID and the routing information of the AUSF, and the Kakma ID is not unique. In this implementation, there are a plurality of searching methods: The Kakma ID and the routing information of the AUSF may be used together to search for the identification information of the AUSF corresponding to Kausf of the UE; or only the routing information of the AUSF may be used to search for the identification information of the AUSF corresponding to Kausf of the UE. Alternatively, only the Kakma ID is used to search for the identification information of the AUSF corresponding to Kausf of the UE. The routing information of the AUSF may include identity information of the UE. For example, may be one or more of an SUCI, a generic public subscription identifier (generic public subscription identifier, GPSI), or a globally unique temporary UE identity (globally unique temporary UE identity, GUTI). The SUCI may be generated by the UE. The UDM may decrypt the SUCI of the UE to obtain the SUPI of the UE, and then the UDM may search for subscription data of the AKMA service of the UE, to determine the AUSF corresponding to Kausf of the UE. The GPSI may be preconfigured on the UE and the UDM, and then the UDM may search for the subscription data of the AKMA service of the UE based on the GPSI, to determine the AUSF corresponding to Kausf of the UE. The GUTI may be allocated by the AMF and sent to the UE. The GUTI may be uniquely located to one AMF by a network. The AMF may uniquely locate the SUPI of the UE based on the GUTI, and may further find the AUSF corresponding to the SUPI of the UE, that is, the AUSF corresponding to Kausf of the UE.
- Further, a core network element may obtain, from the UDM based on the GPSI or the SUCI, the AUSF that stores Kausf, that is, the AUSF corresponding to Kausf of the UE. The core network element may obtain, from the AMF based on the GUTI, the AUSF that stores Kausf. The core network element may be, for example, the AAnF.
- After the AUSF generates the Kakma ID, the AUSF may send the Kakma ID to the UDM, and the UDM stores the Kakma ID. The AUSF may send the Kakma ID by using a service—oriented message, for example, a UDM authentication result confirmation request message (Nudm_UEAuthentication_ResultConfirmation_Request), or may send the Kakma ID by using a newly defined service—oriented message, for example, a Nudm_UEAKMA_InformationUpdate Request message. After receiving the Kakma ID, the UDM stores the value.
- In an implementation, the second identification information includes the Kakma ID and a pseudonym of the AUSF, and the Kakma ID is not unique. The pseudonym of the AUSF may be allocated by an operator. An NRF may locate and determine, by combining the pseudonym of the AUSF with content such as a mobile country code (mobile country code, MCC) and a mobile network code (mobile network code, MNC), the identification information of the AUSF corresponding to Kausf of the UE, that is, the AUSF that stores Kausf. The core network element may obtain, from the NRF based on the pseudonym of the AUSF, the AUSF that stores Kausf.
- Step 602: The AF sends a key request message to the NEF. Correspondingly, the NEF receives the key request message from the AF.
- The key request message may be, for example, a key request message, and requests a communication key between the AF and the UE, that is, Kaf between the AF and the UE. The key request message may include the second identification information, that is, the second identification information received by the AF from the UE. The key request message may alternatively include identification information of the AF, for example, an AF ID, used to identify an AF with which the UE performs AKMA service-based data transmission.
- In this application, the AF is located outside the 5G core network. When communicating with the core network element, the AF needs to use the NEF. Therefore, the AF sends the key request message to the NEF.
- The AF may send the key request message to the NEF when receiving the application session establishment request message, or may send the key request message to the NEF when Kaf between the AF and the UE expires. Kaf expires when, for example, current system time is not within a validity period of Kaf.
- Step 603: The NEF determines whether the AF authorizes the NEF to request a key.
- When receiving the key request message from the AF, the NEF determines whether the AF authorizes the NEF to request the key, in other words, determines whether the AF authorizes the NEF to obtain Kaf between the AF and the UE from the AAnF. For a process in which the NEF determines whether the AF authorizes the NEF to request the key, refer to related descriptions in the current technology.
- If the NEF is authorized by the AF to request the key,
step 604 is performed; or if the NEF is not authorized to request the key, the NEF feeds back a non-authorized notification message to the AF, so that the AF authorizes the NEF to request the key. - This step is an optional step. This means that the NEF may not check whether the AF is authorized.
- Step 604: When a determining result in
step 603 is yes, the NEF sends a first request message to the UDM. Correspondingly, the UDM receives the first request message from the NEF. - The first request message may be, for example, a Nudm SDM Get message, and requests first identification information. The first request message may include the second identification information. Optionally, the first request message may alternatively include the identification information of the AF, for example, the AF ID.
- In an implementation, the second identification information includes a Kakma ID that is unique. When receiving the first request message, the UDM may determine the UE based on the Kakma ID, and then determine the first identification information, where the first identification information includes the SUPI of the UE.
- In an implementation, the second identification information includes a Kakma ID that is not unique and the identity information of the UE, and the identity information of the UE includes the GPSI or the SUCI. When receiving the first request message, the UDM may determine the UE based on the GPSI or the SUCI, and further determine the first identification information, where the first identification information includes the SUPI of the UE.
- In an implementation, the second identification information includes the Kakma ID that is unique and the identity information of the UE, and the identity information of the UE includes the GPSI. When receiving the first request message, the UDM may determine the UE based on the GPSI, and then determine the first identification information, where the first identification information includes the SUPI of the UE.
- That the UDM determines the SUPI of the UE may be understood as that the UDM determines UE corresponding to the Kakma ID. The Kakma ID and/or the SUPI of the UE may be used by the UDM to further search for the subscription data of the AKMA service of the UE, and then determine the identification information of the AUSF corresponding to Kausf of the UE. It may be understood that the Kakma ID and/or the SUPI of the UE are/is used to determine the AUSF corresponding to Kausf of the UE. In other words, the first identification information is used to determine the AUSF corresponding to Kausf of the UE.
- Step 605: The UDM sends a first response message to the NEF. Correspondingly, the NEF receives the first response message from the UDM.
- The first response message may be, for example, an Nudm SDM Get response message, and is used to respond to the first request message. The first response message includes the first identification information determined by the UDM.
- Step 606: The NEF sends the first identification information to the AAnF.
- Correspondingly, an AAnF receives the first identification information from the NEF.
- When receiving the first identification information from the UDM, the NEF sends the first identification information to the AAnF, for example, sends the first identification information to the AAnF by using a submit Key Request message. In other words, the first identification information is carried in the submit Key Request message. When receiving the first identification information, that is, when receiving the SUPI of the UE, the UDM may determine the UE based on the SUPI of the UE, and search for the subscription data of the AKMA service of the UE. Alternatively, the UDM may directly search for the subscription data of the AKMA service of the UE based on the SUPI of the UE.
- Further, the submit Key Request message may further carry the identification information of the AF, for example, the AF ID, so that when obtaining Kakma, the AAnF generates Kaf between the UE and the AF and the validity period of Kaf based on Kakma and the AF ID.
- Further, the submit Key Request message may further include the second identification information, that is, the second identification information received by the NEF from the AF. The second identification information includes the Kakma ID, so that after determining the AUSF corresponding to Kausf of the UE, the AAnF obtains Kakma corresponding to the Kakma ID from the AUSF.
- Step 607: The AAnF sends a second request message to the UDM. Correspondingly, the UDM receives the second request message from the AAnF.
- The second request message may be, for example, an AKMA service request (AKMA service request) message, and requests the identification information of the AUSF corresponding to Kausf of the UE.
- When the second request message includes the first identification information, the first identification information is used to obtain data related to the AKMA service of the UE, and may include the identification information of the AUSF corresponding to Kausf of the UE, and may further include the subscription data of the AKMA service of the UE. For example, the first identification information includes the SUPI of the UE, and the UDM may search for the subscription data of the AKMA service of the UE based on the SUPI of the UE.
- When the second request message includes the second identification information, the second identification information includes the Kakma ID that is unique. The UDM may determine the UE based on the Kakma ID, and then obtain data related to the AKMA service of the UE, including the identification information that determines the AUSF corresponding to Kausf of the UE, and the subscription data of the AKMA service of the UE may also be included.
- In an implementation, the subscription data of the AKMA service of the UE may include the identification information of the AUSF corresponding to Kausf of the UE, and the identification information of the AUSF corresponding to Kausf of the UE may be an AUSF ID corresponding to Kausf of the UE, address information of the AUSF corresponding to Kausf of the UE, serving node (serving node) information of the AUSF corresponding to Kausf of the UE, or the like. The subscription data of the AKMA service of the UE may alternatively include one or more of information such as an AKMA service that can be used by the UE, information about an AF that can provide the AKMA service, or slice information. The AKMA service that can be used by the UE may be represented by a data network name (data network name, DNN). The AF information may be information about binding between the AF ID and the DNN. The slice information may be, for example, network slice selection assistance information (network slice selection assistance information, NSSAI).
- In an implementation, the identification information of the AUSF corresponding to Kausf of the UE is not carried in the subscription data of the AKMA service of the UE. When determining the subscription data of the AKMA service of the UE, the UDM may determine, based on the subscription data of the AKMA service of the UE, the identification information of the AUSF corresponding to Kausf of the UE. Alternatively, the UDM may search for, based on the determined UE, the AUSF corresponding to Kausf of the UE, to determine the identification information of the AUSF corresponding to Kausf of the UE.
- Step 608: The UDM sends a second response message to the AAnF. Correspondingly, the AAnF receives the second response message from the UDM.
- When determining the identification information of the AUSF corresponding to Kausf of the UE, the UDM sends the second response message to the AAnF. The second response message may be, for example, an AKMA service response (AKMA service response) message, and is used to respond to the second request message.
- In an implementation, the second response message includes the subscription data of the AKMA service of the UE, and the subscription data of the AKMA service of the UE includes the identification information of the AUSF corresponding to Kausf of the UE.
- In an implementation, the second response message includes the subscription data of the AKMA service of the UE and the identification information of the AUSF corresponding to Kausf of the UE.
- The AAnF may perform authorization detection based on the subscription data of the AKMA service of the UE. Specifically, the AAnF may check and determine whether the UE can perform the AKMA service by using the AF indicated by the AF ID. If the authorization detection succeeds, step 609 is performed. It should be noted herein that this application provides three methods for the AAnF to obtain the subscription data of the AKMA service of the UE. One method is that the AAnF directly obtains the subscription data of the AKMA service of the UE by using the UDM (step 608), one method is that the AAnF obtains the subscription data of the AKMA service of the UE by using the NEF (step 808), and one method is that the AAnF obtains the subscription data of the AKMA service of the UE by using the AUSF (step 611). The three methods do not need to be implemented together. Only one of them needs to be used.
- Step 609: The AAnF determines the AUSF corresponding to Kausf of the UE.
- When receiving the second response message, the AAnF may determine, based on the identification information of the AUSF corresponding to Kausf of the UE, the AUSF corresponding to Kausf of the UE.
- Optionally, if the subscription data of the AKMA service of the UE is carried in step 608, before determining the AUSF corresponding to Kausf of the UE, the AAnF performs authorization detection on the UE and/or the AF.
- The AAnF performs authorization detection on the UE. Specifically, the AAnF determines, based on the subscription data of the AKMA service of the UE, whether the UE can use the AKMA service. If it is determined that the UE can use the AKMA service, the UE passes the authorization detection. If it is determined that the UE cannot use the AKMA service, the AAnF does not perform
step 610, and feeds back, to the AF by using the NEF, a notification message indicating that the UE cannot use the AKMA service. - The AAnF performs authorization detection on the AF. Specifically, the AAnF determines, based on the subscription data of the AKMA service of the UE, whether the AF can provide the AKMA service for the UE. If the AF can provide the AKMA service for the UE, the AF passes the authorization detection. If the AF cannot provide the AKMA service for the UE, the AAnF does not perform
step 610, and feeds back, to the AF by using the NEF, a notification message indicating that the AF cannot provide the AKMA service for the UE. For example, whether the subscription data of the AKMA service of the UE includes the AF ID is determined. If the subscription data includes the AF ID, the AF may provide the AKMA service for the UE; or if the subscription data does not include the AF ID, the AF cannot provide the AKMA service for the UE. For another example, whether the service that can be provided by the AF is included in the AKMA service that can be used by the UE. If the service is included, the AF may provide the AKMA service for the UE. If the service is not included, the AF cannot provide the AKMA service for the UE. - When the UE or the AF passes the authorization detection, the AAnF may determine, based on the identification information of the AUSF corresponding to Kausf of the UE, the AUSF corresponding to Kausf of the UE.
- Step 610: The AAnF sends an AKMA key request message to the AUSF. Correspondingly, the AUSF receives the key request message from the AAnF.
- The AAnF sends the AKMA key request message to the AUSF corresponding to Kausf of the UE, where the AKMA key request message includes the Kakma ID. The AKMA key request message may be, for example, an AKMA key request message, and requests Kakma corresponding to the Kakma ID.
- Step 611: The AUSF sends an AKMA key response message to the AAnF. Correspondingly, the AAnF receives the AKMA key response message from the AUSF.
- When receiving the AKMA key request message carrying the Kakma ID, the AUSF determines, based on the Kakma ID, Kakma corresponding to the Kakma ID, and sends, to the AAnF by using the AKMA key response message, Kakma corresponding to the Kakma ID. That is, the Kakma is carried in the AKMA key response message. The AKMA key response message may be, for example, an AKMA key response message, and is used to respond to the AKMA key request message.
- Optionally, if the subscription data of the AKMA service of the UE is not carried in step 608, the AKMA key response message may include the subscription data of the AKMA service of the UE.
- Step 612: The AAnF generates Kaf and a validity period of Kaf.
- The AAnF generates Kaf and the validity period of Kaf based on Kakma and the AF ID.
- If the subscription data of the AKMA service of the UE is carried in
step 611, the AAnF may perform authorization detection based on the subscription data of the AKMA service of the UE. Specifically, the AAnF may check and determine whether the UE can perform the AKMA service by using the AF indicated by the AF ID. For specific authorization detection, refer to descriptions of the authorization detection in step 609. If the authorization detection succeeds,step 612 is performed. - Step 613: The AAnF sends Kaf and the validity period of Kaf to the NEF. Correspondingly, the NEF receives Kaf and the validity period of Kaf from the AAnF.
- The AAnF may send Kaf and the validity period of Kaf to the NEF by using a submit key response confirm message, in other words, the validity period of Kaf and Kaf are carried in the submit key response confirm message.
- Step 614: The NEF sends a key response message to the AF. Correspondingly, the AF receives the key response message from the NEF.
- The key response message may be, for example, a key response message, and is used to respond to the key request message in
step 602. The key response message includes Kaf and the validity period of Kaf. - Step 615: The AF sends an application session establishment response message to the UE. Correspondingly, the UE receives the application session establishment response message from the AF.
- The application session establishment response message may be, for example, an application session establishment response message, and is used to respond to the application session establishment request message in
step 601. - After
step 615, the AF may encrypt, within the validity period of Kaf by using Kaf, data sent by the AF to the UE, so that data transmission security can be improved. Correspondingly, when receiving the data from the AF, the UE may decrypt the data by using Kaf. A process in which the UE generates Kaf is similar to a process in which the AAnF generates Kaf. Refer to related descriptions in the current technology. - In the embodiment shown in
FIG. 6A andFIG. 6B , the NEF obtains the first identification information from the UDM, and sends the first identification information to the AAnF. The AAnF obtains, from the UDM based on the first identification information, the identification information of the AUSF corresponding to Kausf of the UE. Therefore, the AAnF can quickly and accurately determine the AUSF that stores Kausf. - In the embodiment shown in
FIG. 6A andFIG. 6B , an example in which the AF is located outside the core network is used. If the AF is located inside the core network, related steps of interaction with the NEF inFIG. 6A andFIG. 6B may be deleted, for example,step 603 and step 606, and step 604 and step 605 are changed to an interaction procedure between the AAnF and the UDM. - Optionally, before
step 601,step 701 to step 705 are further included, as shown inFIG. 7 . - Step 701: UE and an AUSF perform a primary authentication process.
- The UE and the AUSF perform the primary authentication process. For details, refer to detailed descriptions of the primary authentication process in
FIG. 3 . Details are not described herein again. - Step 702: The AUSF generates Kakma and a Kakma ID.
- After the primary authentication process, the AUSF uses Kausf generated during the primary authentication process to generate Kakma and generates the Kakma ID for Kakma.
- In an implementation, the Kakma ID generated by the AUSF is unique, that is, the Kakma ID is globally unique. One Kakma ID is used to uniquely identify one Kakma, and different Kakma correspond to different Kakma IDs. Further, the Kakma ID is unique, one Kakma ID may independently identify one UE, and different UEs correspond to different Kakma IDs. It may be understood that the AUSF may generate different Kakma and Kakma IDs for the different UEs.
- In an implementation, the Kakma ID generated by the AUSF is not unique. In other words, the Kakma ID is not globally unique. Further, the Kakma ID is not unique, and one Kakma ID cannot independently identify one UE.
- Step 703: The AUSF sends the Kakma ID to a UDM. The AUSF sends a UE authentication result confirmation request message or a newly defined service—oriented message to the UDM. Correspondingly, the UDM receives the UE authentication result confirmation request message from the AUSF, or receives the newly defined service-based message. Step 703 and step 704 are described by using an example in which the service-based message is the UE authentication result confirmation request message and a UE authentication result confirmation response message respectively.
- The UE authentication result confirmation request message may include a subscriber permanent identifier (subscriber permanent identifier, SUPI) of the UE and an AUSF ID. The SUPI of the UE is used to identify the UE. The AUSF ID is used to identify an AUSF corresponding to Kausf of the UE, that is, used to identify an AUSF that stores Kausf.
- If the Kakma ID is unique, the UE authentication result confirmation request message carries the Kakma ID, which can be used by the UDM to search for subscription data of an AKMA service of the UE. When the Kakma ID is not unique, the UE authentication result confirmation request message may also include the Kakma ID.
- For the subscription data of the AKMA service of the UE, refer to specific descriptions of the subscription data of the AKMA service of the UE in
step 607. - Step 704: The UDM sends the UE authentication result confirmation response message to the AUSF. Correspondingly, the AUSF receives the UE authentication result confirmation response message from the UDM.
- Optionally, before the UDM sends the UE authentication result confirmation response message to the AUSF, if the UE authentication result confirmation request message carries the Kakma ID, the UDM stores the Kakma ID in the subscription data of the AKMA service of the UE, so that when the UDM receives a second request message, the subscription data of the AKMA service of the UE may be searched for based on first identification information.
- Optionally, the UDM replies with the subscription data of the AKMA service of the UE in the UE authentication result confirmation response message. After receiving the subscription data of the AKMA service, the AUSF stores the subscription data of the UE. In
step 611, the AUSF may send the stored subscription data of the AKMA service of the UE corresponding to the Kakma ID to the AAnF. The AAnF may perform authorization detection based on the subscription data of the AKMA service. Specifically, the AAnF may check and determine whether the UE can perform the AKMA service by using the AF indicated by the AF ID. For specific descriptions, refer to step 609. If the authorization detection succeeds,step 612 is performed. When the AF is inside a SGC, the AAnF can obtain the subscription data of the AKMA service by using this method. - Step 705: The UE generates Kakma and the Kakma ID.
- After the primary authentication process, if the UE is about to initiate the AKMA service, the UE uses Kausf to generate Kakma and generates the Kakma ID for Kakma.
-
FIG. 8A andFIG. 8B are a schematic flowchart of another communication method according to an embodiment of this application. The flowchart may include but is not limited to the following steps. - Step 801: UE sends an application session establishment request message to an AF. Correspondingly, the AF receives the application session establishment request message from the UE.
- Step 802: The AF sends a key request message to an NEF. Correspondingly, the NEF receives the key request message from the AF.
- Step 803: The NEF determines whether the AF authorizes the NEF to request a key.
- Step 804: When a determining result in
step 803 is yes, the NEF sends a first request message to the UDM. Correspondingly, the UDM receives the first request message from the NEF. - Step 805: The UDM sends a first response message to the NEF. Correspondingly, the NEF receives the first response message from the UDM.
- For an implementation process of
step 801 to step 805, refer to specific descriptions ofstep 601 to step 605 in the procedure shown inFIG. 6A andFIG. 6B . Details are not described herein again. - Step 806: The NEF sends first identification information to the UDM.
- Correspondingly, an AAnF receives the first identification information from the NEF.
- The first identification information sent by the NEF to the UDM may be carried in an Nudm_UECM_Get message. The first identification information, for example, an SUPI of the UE, requests subscription data of the UE. The Nudm_UECM_Get message may alternatively carry AKMA service indication information. The Nudm_UECM_Get message carries the SUPI of the UE and the AKMA service indication information, and requests data related to the AKMA service, for example, subscription data of the AKMA service of the UE and identification information of an AUSF corresponding to Kausf of the UE. The AKMA service indication information indicates that related content of the AKMA service is requested, and specifically, “AKMA” may be used as the indication information. For example, Nudm_UECM_Get (SUPI, AKMA).
- Step 807: The UDM sends, to the NEF, the identification information of the AUSF corresponding to Kausf of the UE. Correspondingly, the NEF receives the identification information of the AUSF corresponding to Kausf of the UE from the UDM.
- When receiving the Nudm_UECM_Get message, the UDM determines, based on the SUPI of the UE and the AKMA service indication information, the subscription data of the AKMA service of the UE and/or the identification information of the AUSF corresponding to Kausf of the UE.
- In an implementation, the subscription data of the AKMA service of the UE may include the identification information of the AUSF corresponding to Kausf of the UE. In another implementation, the identification information of the AUSF corresponding to Kausf of the UE is not carried in the subscription data of the AKMA service of the UE. In this case, the identification information of the AUSF corresponding to Kausf of the UE and/or the subscription data of the AKMA service of the UE may be carried.
- The UDM determines the data related to the AKMA service of the UE. The determining includes determining at least one of the identification information of the AUSF corresponding to Kausf of the UE and the subscription data of the AKMA service of the UE. When the identification information of the AUSF corresponding to Kausf of the UE is determined, the identification information of the AUSF corresponding to Kausf of the UE may be sent to the NEF. For example, the identification information of the AUSF corresponding to Kausf of the UE may be sent to the NEF by using an Nudm_UECM_Get response message.
- Optionally, for a case in which the identification information of the AUSF corresponding to Kausf of the UE is not carried in the subscription data of the AKMA service of the UE, the Nudm_UECM_Get response message may include the identification information of the AUSF corresponding to Kausf of the UE and the subscription data of the AKMA service of the UE.
- Step 804 to step 807 are an implementation. To be specific, the NEF first obtains the first identification information from the UDM, and then the NEF obtains, from the UDM based on the first identification information, the identification information of the AUSF corresponding to Kausf of the UE. In another implementation,
step 804 and step 806 are combined, and step 805 and step 807 are combined. To be specific, the NEF directly obtains, from the UDM, the first identification information and the identification information of the AUSF corresponding to Kausf of the UE. For example, the NEF sends the first request message to the UDM, where the first request message includes second identification information, and specifically includes the Kakma ID and/or identity information of the UE. When receiving the first request message, the UDM determines the SUPI of the UE based on the Kakma ID and/or the identity information of the UE, and then determines data related to the AKMA service of the UE. The data related to the AKMA service may include the identification information of the AUSF corresponding to Kausf of the UE, and may further include the subscription data of the AKMA service of the UE. The UDM sends the first response message to the NEF, where the first response message includes the first identification information and the identification information of the AUSF corresponding to Kausf of the UE. The identification information of the AUSF corresponding to Kausf of the UE may be carried in the subscription data of the AKMA service of the UE, or may not be carried in the subscription data of the AKMA service of the UE. - Step 808: The NEF sends, to the AAnF, the identification information of the AUSF corresponding to Kausf of the UE. Correspondingly, the AAnF receives the identification information of the AUSF corresponding to Kausf of the UE from the NEF.
- The NEF may send, to the AAnF by using a submit Key Request message, the identification information of the AUSF corresponding to Kausf of the UE. The submit Key Request message may alternatively include an AF ID. The submit Key Request message may further include the second identification information, for example, the Kakma ID, so that after determining the AUSF corresponding to Kausf of the UE, the AAnF obtains Kakma corresponding to the Kakma ID from the AUSF. If the subscription data of the AKMA service of the UE is obtained in step 807, the subscription data of the AKMA service of the UE further needs to be included in this step.
- Step 809: The AAnF determines the AUSF corresponding to Kausf of the UE.
- When receiving the identification information of the AUSF corresponding to Kausf of the UE, the AAnF may determine, based on the identification information of the AUSF corresponding to Kausf of the UE, the AUSF corresponding to Kausf of the UE.
- Optionally, if the subscription data of the AKMA service of the UE is not carried in
step 808, before determining the AUSF corresponding to Kausf of the UE, the AAnF performs authorization detection on the AF. Specifically, the AAnF may determine, based on the AF ID and preconfiguration information, whether the AF can provide the AKMA service for the UE. The preconfiguration information may be configured by an operator by using a management plane. - Optionally, if the subscription data of the AKMA service of the UE is carried in
step 808, before determining the AUSF corresponding to Kausf of the UE, the AAnF performs authorization detection on the UE and/or the AF. For specific descriptions, refer to corresponding descriptions in step 609. - Step 810: The AAnF sends an AKMA key request message to the AUSF. Correspondingly, the AUSF receives the key request message from the AAnF.
- Step 811: The AUSF sends an AKMA key response message to the AAnF. Correspondingly, the AAnF receives the AKMA key response message from the AUSF.
- Step 812: The AAnF generates Kaf and a validity period of Kaf.
- Step 813: The AAnF sends Kaf and the validity period of Kaf to the NEF. Correspondingly, the NEF receives Kaf and the validity period of Kaf from the AAnF.
- Step 814: The NEF sends the key response message to the AF. Correspondingly, the AF receives the key response message from the NEF.
- Step 815: The AF sends an application session establishment response message to the UE. Correspondingly, the UE receives the application session establishment response message from the AF.
- For an implementation process of
step 810 to step 815, refer to specific descriptions ofstep 610 to step 615 in the procedure shown inFIG. 6A andFIG. 6B . Details are not described herein again. - In the embodiment shown in
FIG. 8A andFIG. 8B , the NEF obtains the first identification information from the UDM, obtains, from the UDM based on the first identification information, the identification information of the AUSF corresponding to Kausf of the UE, and sends the identification information of the AUSF corresponding to Kausf of the UE to the AAnF. Therefore, the AAnF can quickly and accurately determine the AUSF that stores Kausf. - In the embodiment shown in
FIG. 8A andFIG. 8B , an example in which the AF is located outside the core network is used. If the AF is located inside the core network, related steps of interaction with the NEF inFIG. 8A andFIG. 8B may be deleted, for example,step 803 and step 808, and step 804 to step 807 are changed to an interaction procedure between the AAnF and the UDM. - Optionally, before
step 801,step 701 to step 705 are further included, as shown inFIG. 7 . For details, refer to the descriptions ofFIG. 7 . -
FIG. 9 is a schematic flowchart of still another communication method according to an embodiment of this application. The flowchart may include but is not limited to the following steps. - Step 901: UE sends an application session establishment request message to an AF. Correspondingly, the AF receives the application session establishment request message from the UE.
- Step 902: The AF sends a key request message to an NEF. Correspondingly, the NEF receives the key request message from the AF.
- For implementation processes of
step 901 and step 902, refer to specific descriptions ofstep 601 and step 602 in the procedure shown inFIG. 6A andFIG. 6B . Details are not described herein again. - Step 903: The NEF sends the key request message to an AAnF. Correspondingly, the AAnF receives the key request message from the NEF.
- For content carried in the key request message in
step 903, refer to the content carried in the key request message instep 602. Details are not described herein again. - Step 904: The AAnF sends second identification information to the UDM.
- Correspondingly, the UDM receives the second identification information from the AAnF.
- The AAnF may send the second identification information to the UDM by using an Nudm_UECM_Get message.
- In an implementation, the Nudm_UECM_Get message includes the second identification information and AKMA service indication information. For the AKMA service indication information, refer to descriptions of the AKMA service indication information in
step 806. When receiving the Nudm_UECM_Get message, the UDM determines an SUPI of the UE based on the second identification information, and determines, based on the SUPI of the UE and the AKMA service indication information, subscription data of an AKMA service of the UE and/or identification information of an AUSF corresponding to Kausf of the UE. - In an implementation, the Nudm_UECM_Get message includes the second identification information. When receiving the Nudm_UECM_Get message, the UDM determines an SUPI of the UE based on the second identification information, and determines, based on the SUPI of the UE, subscription data of an AKMA service of the UE and/or identification information of an AUSF corresponding to Kausf of the UE.
- Step 905: The UDM sends, to the AAnF, the identification information of the AUSF corresponding to Kausf of the UE. Correspondingly, the AAnF receives the identification information of the AUSF corresponding to Kausf of the UE from the UDM.
- The UDM may send, to the AAnF by using an Nudm_UECM_Get response message, the identification information of the AUSF corresponding to Kausf of the UE.
- Optionally, for a case in which the identification information of the AUSF corresponding to Kausf of the UE is not carried in the subscription data of the AKMA service of the UE, the Nudm_UECM_Get response message may include the identification information of the AUSF corresponding to Kausf of the UE and the subscription data of the AKMA service of the UE.
- Step 906: The AAnF determines the AUSF corresponding to Kausf of the UE.
- In an implementation, if the AAnF receives the subscription data of the AKMA service of the UE, for step 906, refer to corresponding descriptions in step 609. Details are not described herein again.
- In an implementation, if the AAnF does not receive the subscription data of the AKMA service of the UE, for step 906, refer to corresponding descriptions in step 809. Details are not described herein again.
- Step 907: The AAnF sends an AKMA key request message to the AUSF. Correspondingly, the AUSF receives the key request message from the AAnF.
- Step 908: The AUSF sends an AKMA key response message to the AAnF. Correspondingly, the AAnF receives the AKMA key response message from the AUSF.
- Step 909: The AAnF generates Kaf and a validity period of Kaf.
- Step 910: The AAnF sends Kaf and the validity period of Kaf to the NEF. Correspondingly, the NEF receives Kaf and the validity period of Kaf from the AAnF.
- Step 911: The NEF sends the key response message to the AF. Correspondingly, the AF receives the key response message from the NEF.
- Step 912: The AF sends an application session establishment response message to the UE. Correspondingly, the UE receives the application session establishment response message from the AF.
- For an implementation process of
step 907 to step 912, refer to specific descriptions ofstep 610 to step 615 in the procedure shown inFIG. 6A andFIG. 6B . Details are not described herein again. - In the embodiment shown in
FIG. 9 , when receiving the key request message from the AF, the NEF directly forwards the key request message to the AAnF, and the AAnF autonomously obtains, from the UDM, the identification information of the AUSF corresponding to Kausf of the UE. Therefore, the AAnF can quickly and accurately determine the AUSF corresponding to Kausf of the UE. - Optionally, before
step 901,step 701 to step 705 are further included, as shown inFIG. 7 . For details, refer to the descriptions ofFIG. 7 . - A difference between the embodiment shown in
FIG. 9 and the embodiments shown inFIG. 6A andFIG. 6B andFIG. 8A andFIG. 8B lies in that, inFIG. 9 , the NEF does not determine whether the AF authorizes the NEF to request a key, and the NEF directly forwards, to the AAnF, the key request message sent by the AF, so that an implementation process is simpler. - If the AF is located inside a core network, step 903 may be deleted from
FIG. 9 . - In correspondence to the method provided in the foregoing method embodiments, an embodiment of this application further provides a corresponding apparatus. The apparatus includes corresponding modules configured to perform the foregoing embodiments. The module may be software, hardware, or a combination of software and hardware.
-
FIG. 10 is a schematic diagram of a structure of a communication apparatus according to this application. The communication apparatus 1000 shown inFIG. 10 includes atransceiver module 1001 and aprocessing module 1002. - In a possible design, the apparatus 1000 is an AAnF.
- For example, the
processing module 1002 is configured to: receive, by using thetransceiver module 1001, first identification information from a network exposure function network element, where the first identification information is used to determine an authentication server function network element corresponding to a terminal device; and obtain, from a unified data management network element based on the first identification information, identification information of the authentication server function network element corresponding to the terminal device. - Optionally, the first identification information includes an SUPI of the terminal device.
- The
processing module 1002 is specifically configured to: send, by using thetransceiver module 1001, a second request message to the unified data management network element, where the second request message includes an SUPI of the terminal device, and the second request requests the unified data management network element to determine, based on the SUPI of the terminal device, the identification information of the authentication server function network element corresponding to the terminal device; and receive a second response message from the unified data management network element, where the second response message includes the identification information of the authentication server function network element corresponding to the terminal device. - Optionally, the second response message further includes subscription data of an AKMA service of the terminal device.
- Optionally, the
processing module 1002 is further configured to: receive, by using thetransceiver module 1001, an identifier of an application function network element from a network exposure function network element; and obtain, from the authentication server function network element corresponding to the terminal device, a key that is of the AKMA service and that is identified by identification information of the key of the AKMA service. - The
processing module 1002 is further configured to generate a communication key between the application function network element and the terminal device based on the identifier of the application function network element and the key of the AKMA service. - The
processing module 1002 is further configured to send, by using thetransceiver module 1001, the communication key to the application function network element by using the network exposure function network element. - Optionally, the
processing module 1002 is further configured to: perform authorization detection on the terminal device or the application function network element, and when completing the authorization detection, determine the authentication server function network element identified by the identification information of the authentication server function network element corresponding to the terminal device. - Optionally, the authentication server function network element corresponding to the terminal device is an authentication server function network element corresponding to an intermediate key of the terminal device, and stores the intermediate key generated by the authentication server function network element in a primary authentication process.
- The example is used to implement the function of the AAnF in the embodiment shown in
FIG. 6A andFIG. 6B . When the apparatus 1000 is the AAnF, the apparatus 1000 is further configured to implement the function of the AAnF in the embodiments shown inFIG. 8A andFIG. 8B andFIG. 9 . For details, refer to corresponding descriptions of the AAnF inFIG. 6A andFIG. 6B ,FIG. 8A andFIG. 8B , andFIG. 9 . - In a possible design, the apparatus 1000 is an NEF.
- For example, the
processing module 1002 is configured to: obtain, by using thetransceiver module 1001, first identification information from the unified data management network element, where the first identification information is used to determine the authentication server function network element corresponding to the terminal device, and send the first identification information to an AKMA anchor function network element. - Optionally, the
processing module 1002 is specifically configured to: receive, by using thetransceiver module 1001, second identification information from the application function network element; send a first request message to the unified data management network element when determining that the application function network element authorizes the network exposure function network element to request a key, where the first request message includes the second identification information, and requests the unified data management network element to determine the first identification information based on the second identification information; and receive a first response message from the unified data management network element, where the first response message includes the first identification information. - Optionally, the second identification information includes identification information of a key of the AKMA service, and the first identification information includes an SUPI of the terminal device.
- Optionally, the second identification information includes identification information of a key of the AKMA service and temporary identity information of the terminal device, and the first identification information includes an SUPI of the terminal device.
- Optionally, the
processing module 1002 is further configured to: receive, by using thetransceiver module 1001, the identifier of the application function network element, and send the identifier of the application function network element to an AKMA anchor function network element. - Optionally, the authentication server function network element corresponding to the terminal device is an authentication server function network element corresponding to an intermediate key of the terminal device, and stores the intermediate key generated by the authentication server function network element in a primary authentication process.
- The example is used to implement the function of the NEF in the embodiment shown in
FIG. 6A andFIG. 6B . When the apparatus 1000 is the NEF, the apparatus 1000 is further configured to implement the function of the NEF in the embodiments shown inFIG. 8A andFIG. 8B andFIG. 9 . For details, refer to corresponding descriptions of the NEF inFIG. 6A andFIG. 6B ,FIG. 8A andFIG. 8B , andFIG. 9 . -
FIG. 11 is a schematic diagram of a structure of another communication apparatus according to this application. Acommunication apparatus 1100 shown inFIG. 11 includes at least oneprocessor 1101 and amemory 1102, and optionally, may further include acommunication interface 1103. - The
memory 1102 may be a volatile memory such as a random access memory. Alternatively, the memory may be a non-volatile memory such as a read-only memory, a flash memory, a hard disk drive (hard disk drive, HDD), or a solid-state drive (solid-state drive, SSD). Alternatively, thememory 1102 is any other medium that can be used to carry or store expected program code in an instruction form or a data structure form and that can be accessed by a computer, but is not limited thereto. Thememory 1102 may be a combination of the foregoing memories. - In this embodiment of this application, a specific connection medium between the
processor 1101 and thememory 1102 is not limited. In this embodiment of this application, thememory 1102 and theprocessor 1101 are connected through abus 1104. Thebus 1104 is represented by using a bold line in the figure, and a connection manner between other parts is merely used as an example for description, and does not limit this application. Thebus 1104 may be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one bold line is used to represent the bus inFIG. 11 , but this does not mean that there is only one bus or only one type of bus. - The
processor 1101 may have a data transceiver function, and can communicate with another device. In the apparatus shown inFIG. 11 , an independent data transceiver module, for example, thecommunication interface 1103, may also be disposed and is configured to receive and send data. When communicating with the another device, theprocessor 1101 may transmit data through thecommunication interface 1103. - In an example, when an AAnF uses the form shown in
FIG. 11 , the processor inFIG. 11 may invoke computer-executable instructions stored in thememory 1102, so that the AAnF is enabled to perform the method performed by the AAnF in any one of the foregoing method embodiments. - In an example, when an NEF uses the form shown in
FIG. 11 , the processor inFIG. 11 may invoke the computer-executable instructions stored in thememory 1102, so that the NEF is enabled to perform the method performed by the NEF in any one of the foregoing method embodiments. - Specifically, functions/implementation processes of the processing module and the transceiver module in
FIG. 10 may be implemented by theprocessor 1101 inFIG. 11 invoking the computer-executable instructions stored in thememory 1102. Alternatively, functions/implementation processes of the processing module inFIG. 10 may be implemented by theprocessor 1101 inFIG. 11 invoking the computer-executable instructions stored in thememory 1102, and functions/implementation processes of the transceiver module inFIG. 8A andFIG. 8B may be implemented through thecommunication interface 1103 inFIG. 11 . - An embodiment of this application further provides a communication system. The system may include the AAnF and the NEF in
FIG. 6A andFIG. 6B toFIG. 9 , and optionally, may further include the UDM, the UE, the AF, and the AUSF inFIG. 6A andFIG. 6B toFIG. 9 . - It may be understood that, in some scenarios, some optional features in embodiments of this application may be independently implemented without depending on another feature, for example, a solution on which the optional features are currently based, to resolve a corresponding technical problem and achieve a corresponding effect. Alternatively, in some scenarios, the optional features are combined with other features based on requirements. Correspondingly, the apparatus provided in embodiments of this application may also correspondingly implement these features or functions. Details are not described herein.
- A person skilled in the art may further understand that various illustrative logical blocks (illustrative logical blocks) and steps (steps) that are listed in embodiments of this application may be implemented by using electronic hardware, computer software, or a combination thereof. Whether the functions are implemented by using hardware or software depends on particular applications and a design requirement of the entire system. A person skilled in the art may use various methods to implement the functions for corresponding application, but it should not be considered that the implementation goes beyond the scope of embodiments of this application.
- The solutions described in this application may be implemented in various manners. For example, the technologies may be implemented by hardware, software, or a combination thereof. For hardware implementation, a processing unit configured to execute these technologies at a communication apparatus (for example, a base station, a terminal, a network entity, a core network element, or a chip) may be implemented in one or more general-purpose processors, digital signal processors (digital signal processor, DSP), digital signal processor components, or application-specific integrated circuits (application-specific integrated circuit, ASIC), programmable logic devices, field programmable gate arrays (field programmable gate array, FPGA), or another programmable logic apparatus, discrete gate or transistor logic, discrete hardware component, or any combination thereof. The general-purpose processor may be a microprocessor. Optionally, the general-purpose processor may alternatively be any conventional processor, controller, microcontroller, or state machine. The processor may alternatively be implemented by a combination of computing apparatuses, such as a digital signal processor and a microprocessor, a plurality of microprocessors, one or more microprocessors in combination with a digital signal processor core, or any other similar configuration.
- It may be understood that the memory in embodiments of this application may be a volatile memory or a non-volatile memory, or may include a volatile memory and a non-volatile memory. The non-volatile memory may be a read-only memory (read-only memory, ROM), a programmable read-only memory (programmable ROM, PROM), an erasable programmable read-only memory (erasable PROM, EPROM), an electrically erasable programmable read-only memory (electrically EPROM, EEPROM), or a flash memory. The volatile memory may be a random access memory (random access memory, RAM), used as an external cache. Through example but not limitative description, many forms of RAMs may be used, for example, a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), a synchronous dynamic random access memory (synchronous DRAM, SDRAM), a double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), an enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), a synchlink dynamic random access memory (synchlink DRAM, SLDRAM), and a direct rambus random access memory (direct rambus RAM, DR RAM). It should be noted that the memory of the systems and methods described in this specification includes but is not limited to these and any memory of another appropriate type.
- This application further provides a computer-readable medium storing a computer program. When the computer program is executed by a computer, functions of any one of the foregoing method embodiments are implemented.
- This application further provides a computer program product. When the computer program product is executed by a computer, functions of any one of the foregoing method embodiments are implemented.
- All or some of the foregoing embodiments may be implemented by software, hardware, firmware, or any combination thereof. When software is used to implement embodiments, all or some of the embodiments may be implemented in a form of a computer program product. The computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on a computer, all or some of the procedures or functions according to embodiments of this application are generated. The computer may be a general-purpose computer, a dedicated computer, a computer network, or another programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or may be transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center to another website, computer, server, or data center in a wired (for example, a coaxial cable, an optical fiber, or a digital subscriber line (digital subscriber line, DSL)) or wireless (for example, infrared, radio, or microwave) manner. The computer-readable storage medium may be any usable medium accessible by a computer, or a data storage device, such as a server or a data center, integrating one or more usable media. The usable medium may be a magnetic medium (for example, a floppy disk, a hard disk drive, or a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), a semiconductor medium (for example, a solid-state drive (solid state disc, SSD)), or the like.
- It may be understood that “an embodiment” mentioned in the entire specification means that particular features, structures, or characteristics related to the embodiment are included in at least one embodiment of this application. Therefore, embodiments in the entire specification do not necessarily refer to a same embodiment. In addition, these particular features, structures, or characteristics may be combined in one or more embodiments by using any appropriate manner. It may be understood that sequence numbers of the foregoing processes do not mean an execution sequence in various embodiments of this application. The execution sequence of the processes should be determined based on functions and internal logic of the processes, and should not be construed as any limitation on the implementation processes of embodiments of this application.
- It may be understood that, in this application, “when” and “if” mean that an apparatus performs corresponding processing in an objective situation, but do not constitute a limitation on time, do not require that the apparatus have a determining action during implementation, and do not mean any other limitation.
- “Simultaneously” in this application may be understood as being at a same time point, may be understood as being within a time period, or may be understood as being within a same periodicity.
- In this application, unless otherwise specified, an element represented in a singular form is intended to represent “one or more”, but is not intended to represent “one and only one”. In this application, unless otherwise specified, “at least one” is intended to represent “one or more”, and “a plurality of” is intended to represent “two or more”.
- In addition, the terms “system” and “network” may be used interchangeably in this specification. The term “and/or” in this specification describes only an association relationship for describing associated objects and represents that three relationships may exist. For example, A and/or B may represent the following three cases: only A exists, both A and B exist, and only B exists. A may be singular or plural, and B may be singular or plural.
- It may be understood that, in embodiments of this application, “B corresponding to A” indicates that B is associated with A, and B may be determined based on A. However, it should be further understood that determining B based on A does not mean that B is determined based only on A. B may alternatively be determined based on A and/or other information.
- The correspondences shown in the tables in this application may be configured, or may be predefined. Values of the information in the tables are only examples, and other values may be configured. This is not limited in this application. When a correspondence between information and each parameter is configured, not all correspondences shown in the tables need to be configured. For example, in the tables in this application, correspondences shown in some rows may alternatively not be configured. For another example, proper deformations and adjustments such as splitting and combination may be performed based on the foregoing tables. Names of the parameters shown in titles of the foregoing tables may alternatively be other names that can be understood by a communication apparatus, and values or representation manners of the parameters may alternatively be other values or representation manners that can be understood by the communication apparatus. During implementation of the foregoing tables, another data structure, such as an array, a queue, a container, a stack, a linear table, a pointer, a linked list, a tree, a graph, a structure, a class, a pile, or a hash table, may alternatively be used.
- “Predefine” in this application may be understood as “define”, “predefine”, “store”, “pre-store”, “pre-negotiate”, “pre-configure”, “solidify”, or “pre-burn”.
- A person of ordinary skill in the art may understand that units and algorithm steps in the examples described with reference to embodiments disclosed in this specification can be implemented by electronic hardware or a combination of computer software and electronic hardware. Whether the functions are performed by hardware or software depends on particular applications and design constraints of the technical solutions. A person skilled in the art may use different methods to implement the described functions for each particular application, but it should not be considered that the implementation goes beyond the scope of this application.
- A person of ordinary skill in the art may understand that, for a purpose of convenient and brief descriptions, for a detailed working process of the foregoing system, apparatus, and unit, refer to a corresponding process in the foregoing method embodiments. Details are not described herein again.
- It may be understood that the system, apparatus, and method described in this application may alternatively be implemented in another manner. For example, the foregoing apparatus embodiments are merely examples. For example, division of the units is merely logical function division and may be other division during actual implementation. For example, a plurality of units or components may be combined or integrated into another system, or some features may be ignored or not performed. In addition, the displayed or discussed mutual couplings or direct couplings or communication connections may be implemented through some interfaces. The indirect couplings or communication connections between the apparatuses or units may be implemented in an electrical form, a mechanical form, or another form.
- The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one location, or may be distributed on a plurality of network units. Some or all of the units may be selected based on actual requirements to achieve the objectives of the solutions of the embodiments.
- In addition, function units in embodiments of this application may be integrated into one processing unit, or each of the units may exist alone physically, or two or more units are integrated into one unit.
- When the functions are implemented in a form of a software functional unit and sold or used as an independent product, the functions may be stored in a computer-readable storage medium. Based on such an understanding, the technical solutions of this application essentially, or the part contributing to the conventional technology, or some of the technical solutions may be implemented in a form of a software product. The computer software product is stored in a storage medium, and includes a plurality of instructions for instructing a computer device (which may be a personal computer, a server, a network device, or the like) to perform all or some of the steps of the methods described in embodiments of this application. The foregoing storage medium includes various media that can store program code, such as a USB flash drive, a removable hard disk, a read-only memory (Read-Only Memory, ROM), a random access memory (Random Access Memory, RAM), a magnetic disk, or an optical disc.
- For same or similar parts in embodiments of this application, refer to each other. In embodiments of this application and the implementations/implementation methods in embodiments, unless otherwise specified or a logical conflict occurs, terms and/or descriptions are consistent and may be mutually referenced between different embodiments and between the implementations/implementation methods in embodiments. Technical features in the different embodiments and the implementations/implementation methods in embodiments may be combined to form a new embodiment, implementation, or implementation method according to an internal logical relationship thereof. The foregoing descriptions are implementations of this application, but are not intended to limit the protection scope of this application.
- The foregoing descriptions are merely specific implementations of this application, but are not intended to limit the protection scope of this application. Any variation or replacement readily figured out by a person skilled in the art within the technical scope disclosed in this application shall fall within the protection scope of this application.
Claims (20)
1. A communication system, wherein the system is configured to implement authentication and key management for applications (AKMA) service-based data transmission between a terminal device and an application function network element, and the system comprises an AKMA anchor function network element and a network exposure function network element, wherein
the network exposure function network element is configured to: receive second identification information from the application function network element; send a first request message to a unified data management network element when determining that the application function network element authorizes the network exposure function network element to request a key, wherein the first request message, comprising the second identification information, requests the unified data management network element to determine the first identification information based on the second identification information; and receive a first response message from the unified data management network element, wherein the first response message comprises the first identification information; wherein the first identification information is used to determine an authentication server function network element corresponding to the terminal device, and send the first identification information to the AKMA anchor function network element; and
the AKMA anchor function network element is configured to obtain, from the unified data management network element based on the first identification information, identification information of the authentication server function network element corresponding to the terminal device.
2. The system according to claim 1 , wherein the second identification information comprises identification information of a key of the AKMA service, and the first identification information comprises a subscriber permanent identifier, SUPI, of the terminal device.
3. The system according to claim 1 , wherein the second identification information comprises identification information of a key of the AKMA service and temporary identity information of the terminal device, and the first identification information comprises an SUPI of the terminal device.
4. The system according to claim 2 , wherein when being configured to obtain, from the unified data management network element based on the first identification information, the identification information of the authentication server function network element corresponding to the terminal device, the AKMA anchor function network element is specifically configured to: send a second request message to the unified data management network element, wherein the second request message comprises the SUPI of the terminal device, and the second request requests the unified data management network element to determine, based on the SUPI of the terminal device, the identification information of the authentication server function network element corresponding to the terminal device; and receive a second response message from the unified data management network element, wherein the second response message comprises the identification information of the authentication server function network element corresponding to the terminal device.
5. The system according to claim 1 , wherein the authentication server function network element corresponding to the terminal device is an authentication server function network element corresponding to an intermediate key of the terminal device, and stores the intermediate key generated by the authentication server function network element in a primary authentication process.
6. A communication method, wherein the method is used to implement AKMA service— based data transmission between a terminal device and an application function network element, and the method comprises:
receiving, by an AKMA anchor function network element, first identification information from a network exposure function network element; wherein the first identification information comprises an SUPI of the terminal device; and
sending, by the AKMA anchor function network element, a second request message to the unified data management network element, wherein the second request message comprises the SUPI of the terminal device; and
receiving, by the AKMA anchor function network element, a second response message from the unified data management network element, wherein the second response message comprises identification information of the authentication server function network element corresponding to the terminal device.
7. The method according to claim 6 , wherein the second response message further comprises subscription data of an AKMA service of the terminal device.
8. The method according to claim 6 , wherein the method further comprises:
receiving, by the AKMA anchor function network element, an identifier of the application function network element from the network exposure function network element;
obtaining, by the AKMA anchor function network element from the authentication server function network element corresponding to the terminal device, a key that is of the AKMA service and that is identified by identification information of the key of the AKMA service;
generating, by the AKMA anchor function network element, a communication key between the application function network element and the terminal device based on the identifier of the application function network element and the key of the AKMA service; and
sending, by the AKMA anchor function network element, the communication key to the application function network element by using the network exposure function network element.
9. The method according to claim 8 , wherein the method further comprises:
performing, by the AKMA anchor function network element, authorization detection on the terminal device or the application function network element, and when completing the authorization detection, determining the authentication server function network element identified by the identification information of the authentication server function network element corresponding to the terminal device.
10. The method according to claim 6 , wherein the authentication server function network element corresponding to the terminal device is an authentication server function network element corresponding to an intermediate key of the terminal device, and stores the intermediate key generated by the authentication server function network element in a primary authentication process.
11. A communication method, wherein the method is used to implement AKMA service— based data transmission between a terminal device and an application function network element, and the method comprises:
receiving, by a network exposure function network element, second identification information from the application function network element;
sending, by the network exposure function network element, a first request message to a unified data management network element when determining that the application function network element authorizes the network exposure function network element to request a key, wherein the first request message, comprising the second identification information, requests the unified data management network element to determine the first identification information based on the second identification information;
receiving, by the network exposure function network element, a first response message from the unified data management network element, wherein the first response message comprises the first identification information; wherein the first identification information is used to determine an authentication server function network element corresponding to the terminal device; and
sending, by the network exposure function network element, the first identification information to an AKMA anchor function network element.
12. The method according to claim 11 , wherein the second identification information comprises identification information of a key of the AKMA service, and the first identification information comprises an SUPI of the terminal device.
13. The method according to claim 11 , wherein the second identification information comprises identification information of a key of the AKMA service and temporary identity information of the terminal device, and the first identification information comprises an SUPI of the terminal device.
14. The method according to claim 11 , wherein the method further comprises:
receiving, by the network exposure function network element, an identifier of the application function network element; and sending the identifier of the application function network element to the AKMA anchor function network element.
15. The method according to claim 11 , wherein the authentication server function network element corresponding to the terminal device is an authentication server function network element corresponding to an intermediate key of the terminal device, and stores the intermediate key generated by the authentication server function network element in a primary authentication process.
16. The method according to claim 11 , wherein the method further comprises:
receiving, by the AKMA anchor function network element, the first identification information from the network exposure function network element;
sending, by the AKMA anchor function network element, a second request message to the unified data management network element, wherein the second request message comprises the SUPI of the terminal device; and
receiving, by the AKMA anchor function network element, a second response message from the unified data management network element, wherein the second response message comprises identification information of the authentication server function network element corresponding to the terminal device.
17. The method according to claim 16 , wherein the second response message further comprises subscription data of an AKMA service of the terminal device.
18. The method according to claim 16 , wherein the method further comprises:
receiving, by the AKMA anchor function network element, an identifier of the application function network element from the network exposure function network element;
obtaining, by the AKMA anchor function network element from the authentication server function network element corresponding to the terminal device, a key that is of the AKMA service and that is identified by identification information of the key of the AKMA service;
generating, by the AKMA anchor function network element, a communication key between the application function network element and the terminal device based on the identifier of the application function network element and the key of the AKMA service; and
sending, by the AKMA anchor function network element, the communication key to the application function network element by using the network exposure function network element.
19. The method according to claim 18 , wherein the method further comprises:
performing, by the AKMA anchor function network element, authorization detection on the terminal device or the application function network element, and when completing the authorization detection, determining the authentication server function network element identified by the identification information of the authentication server function network element corresponding to the terminal device.
20. The method according to claim 16 , wherein the authentication server function network element corresponding to the terminal device is an authentication server function network element corresponding to an intermediate key of the terminal device, and stores the intermediate key generated by the authentication server function network element in a primary authentication process.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010239015.9A CN113541925B (en) | 2020-03-30 | 2020-03-30 | Communication system, method and device |
CN202010239015.9 | 2020-03-30 | ||
PCT/CN2021/084120 WO2021197347A1 (en) | 2020-03-30 | 2021-03-30 | Communication system, method and apparatus |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/084120 Continuation WO2021197347A1 (en) | 2020-03-30 | 2021-03-30 | Communication system, method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
US20230019089A1 true US20230019089A1 (en) | 2023-01-19 |
Family
ID=77929657
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/954,167 Pending US20230019089A1 (en) | 2020-03-30 | 2022-09-27 | Communication system, method, and apparatus |
Country Status (5)
Country | Link |
---|---|
US (1) | US20230019089A1 (en) |
EP (1) | EP4120619A4 (en) |
CN (1) | CN113541925B (en) |
AU (1) | AU2021248311B2 (en) |
WO (1) | WO2021197347A1 (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115280715A (en) * | 2020-03-31 | 2022-11-01 | 中兴通讯股份有限公司 | Parameters for application communication establishment |
CN118743255A (en) * | 2022-02-21 | 2024-10-01 | 诺基亚技术有限公司 | Authorizing mobile network services to external application functions |
CN117413488A (en) * | 2022-05-13 | 2024-01-16 | 北京小米移动软件有限公司 | Key management method, device, equipment and storage medium |
CN115065970A (en) * | 2022-06-23 | 2022-09-16 | 中国联合网络通信集团有限公司 | Authentication method and trusted wireless local area network interactive function equipment |
CN117676558A (en) * | 2022-09-06 | 2024-03-08 | 华为技术有限公司 | Network information processing method and device |
CN118266240A (en) * | 2022-10-26 | 2024-06-28 | 北京小米移动软件有限公司 | Processing method and device based on AI network function |
WO2024138758A1 (en) * | 2022-12-30 | 2024-07-04 | 北京小米移动软件有限公司 | Sensing information acquisition method and apparatus |
CN118611892A (en) * | 2023-03-06 | 2024-09-06 | 华为技术有限公司 | Communication method and communication device |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230068196A1 (en) * | 2020-02-19 | 2023-03-02 | Samsung Electronics Co., Ltd. | Apparatus and method of generating application specific keys using key derived from network access authentication |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11553381B2 (en) * | 2018-01-12 | 2023-01-10 | Qualcomm Incorporated | Method and apparatus for multiple registrations |
CN110167013B (en) * | 2018-02-13 | 2020-10-27 | 华为技术有限公司 | Communication method and device |
US11076447B2 (en) * | 2018-02-20 | 2021-07-27 | Intel Corporation | Efficient and reliable data transfer in 5G systems |
US11224093B2 (en) * | 2018-08-13 | 2022-01-11 | Ofinno, Llc | Network initiated UPF sessions transfer |
CN110881185B (en) * | 2018-09-05 | 2022-02-25 | 华为技术有限公司 | Communication method and device |
CN110881020B (en) * | 2018-09-06 | 2021-07-23 | 大唐移动通信设备有限公司 | Authentication method for user subscription data and data management network element |
-
2020
- 2020-03-30 CN CN202010239015.9A patent/CN113541925B/en active Active
-
2021
- 2021-03-30 WO PCT/CN2021/084120 patent/WO2021197347A1/en active Application Filing
- 2021-03-30 EP EP21781915.0A patent/EP4120619A4/en active Pending
- 2021-03-30 AU AU2021248311A patent/AU2021248311B2/en active Active
-
2022
- 2022-09-27 US US17/954,167 patent/US20230019089A1/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230068196A1 (en) * | 2020-02-19 | 2023-03-02 | Samsung Electronics Co., Ltd. | Apparatus and method of generating application specific keys using key derived from network access authentication |
Also Published As
Publication number | Publication date |
---|---|
CN113541925B (en) | 2023-02-14 |
AU2021248311B2 (en) | 2024-06-27 |
CN113541925A (en) | 2021-10-22 |
AU2021248311A1 (en) | 2022-11-03 |
EP4120619A4 (en) | 2023-07-26 |
WO2021197347A1 (en) | 2021-10-07 |
EP4120619A1 (en) | 2023-01-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230019089A1 (en) | Communication system, method, and apparatus | |
US11737045B2 (en) | Connection processing method and apparatus in multi-access scenario | |
US11722891B2 (en) | User authentication in first network using subscriber identity module for second legacy network | |
EP3648432B1 (en) | Discovery method and device for network function service | |
US11582602B2 (en) | Key obtaining method and device, and communications system | |
US11974132B2 (en) | Routing method, apparatus, and system | |
US12101630B2 (en) | Mobile device authentication without electronic subscriber identity module (eSIM) credentials | |
US20210250344A1 (en) | Service authorization method and communications apparatus | |
US10805793B2 (en) | Communication method and device | |
WO2020088026A1 (en) | Authentication method employing general bootstrapping architecture (gba) and related apparatus | |
US20230319556A1 (en) | Key obtaining method and communication apparatus | |
US20230086032A1 (en) | Key management method, device, and system | |
US20230024999A1 (en) | Communication system, method, and apparatus | |
US20210168139A1 (en) | Network Slice Authentication Method and Communications Apparatus | |
US20220174063A1 (en) | Communication method, apparatus, and system | |
US12015707B2 (en) | Communication method and related product | |
US20230232228A1 (en) | Method and apparatus for establishing secure communication | |
TW202308363A (en) | Authentication between user equipment and communication network for onboarding process | |
US20240179525A1 (en) | Secure communication method and apparatus | |
WO2023213301A1 (en) | Authentication method, communication apparatus, and computer-readable storage medium | |
US20240137764A1 (en) | User Equipment Authentication and Authorization Procedure for Edge Data Network | |
WO2021073382A1 (en) | Registration method and apparatus | |
WO2023216274A1 (en) | Key management method and apparatus, device, and storage medium | |
US20230354028A1 (en) | Method, system, and apparatus for generating key for inter-device communication | |
WO2023141945A1 (en) | Authentication mechanism for access to an edge data network based on tls-psk |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |